· Stability in the Frequency Domain
1. Consider a closed-loop system that has the loop transfer function L(s) = Gc(s)G(s) = Ke-TS / s
1. Determine the gain K so that the phase margin is 60 degrees when T = 0.2.
2. Plot the phase margin versus the time delay T for K as in part (a).
2. Include all MATLAB code, calculations and screenshots in a Word entitled “Lab6_StudentID”.
3. Upload file “Lab6_StudentID”
Shipping SaaS 1
SWE482-1801A-01
Software Engineering Capstone II
Shipping SaaS Team Project
Blake Foster, Courie Gomez, James Allendoerfer, Joseph Robinson, Terelle Allen
With additional contributions by Phillip Hart and Destiny Barrera
1/10/2018
Table of Contents
Project Outline 3
Development Methodology 7
Requirements 9
Design 12
Development and Testing 18
Project Schedule 29
Risk Analysis 36
References 39
Project Outline
*Portions of this section have been repurposed from SWE481-1704B-01 Unit 1 Group Project Proposal
CTU Regional has commissioned the design and implementation of an inventory tracking and shipping service. The service is needed as a centralized stateless/RESTful SaaS (Software as a Service). The team developing the SaaS should be familiar in database communication, API development, and network communication. As the customers place an order, the payment is processed and inventory is pulled from the warehouse. Once completed, the order is fed to the shipping service, which will then take on the role of managing the shipment. The service provides API endpoints related to orders and shipping. The API can be used by as many applications as necessary. Usage examples might include employees updating the status of the order at key points along the way (such as when inventory is packaged, when the order is placed for carrier pickup, and entering tracking), calculating shipping costs, or creating/printing mailing labels. It will also track inventory numbers and aid in the processing and management of the shipments themselves. Employees must have access to make updates as the order progresses. For example, warehouse employees will be able to update when an order has been picked, packed, and when it is shipped.
Here, the Shipping SaaS manages incoming order tracking surrounded by four external systems, each requiring API access and integration. That said, this picture will be expanded and explained in greater detail later in the document. However, there are some issues which need to be addressed.
The design of this application needs to be carefully created. Since it is being designed with an API that can have a number of different GUIs created to interact, the API needs to be efficient, secure, well documented, and reliable. Below is a list of major issues to consider in the development of the service (Kodumal, 2015.)
Issues
Description
SaaS API Support from each system
Warehouse System, Customer Service System, Website Order System.
SaaS Performance
Depending on the size and number of orders, there may be a m.
SCRUM has grown in popularity and acceptance by many companies over the world with numbers of registered SCRUM Masters reaching 51,955 (11 March 2009 - Jeff Sutherland). Although SCRUM does not stipulate what tools to use to produce the necessary artifacts, Microsoft Team Foundation System provides a number of features via TFS Explorer that facilitate capturing the artifacts of SCRUM and is a useful tool for any SCRUM Master, Team and Product Owner. This presentation will highlight the SCRUM framework and show you practical use of TFS and other tools that facilitate the ceremonies and artifacts of SCRUM.
DESIGN OF A MULTI-AGENT SYSTEM ARCHITECTURE FOR THE SCRUM METHODOLOGYijseajournal
The objective of this paper is to design a multi-agent system architecture for the Scrum methodology.
Scrum is an iterative, incremental framework for software development which is flexible, adaptable and
highly productive. An agent is a system situated within and a part of an environment that senses the
environment and acts on it, over time, in pursuit of its own agenda and so as to effect what it senses in the
future (Franklin and Graesser, 1996). To our knowledge, this is first attempt to include software agents in
the Scrum framework. Furthermore, our design covers all the stages of software development. Alternative
approaches were only restricted to the analysis and design phases. This Multi-Agent System (MAS)
Architecture for Scrum acts as a design blueprint and a baseline architecture that can be realised into a
physical implementation by using an appropriate agent development framework. The development of an
experimental prototype for the proposed MAS Architecture is in progress. It is expected that this tool will
provide support to the development team who will no longer be expected to report, update and manage
non-core activities daily.
Software Engineering in a Quick and Easy way - v1.pdfKAJAL MANDAL
The Most Common must know Software Development life cycle Models. As we discussed in our earlier article on Software Engineering, we have learned about the aspects of Software Engineering and the qualities that it should possess. Now let us move ahead and learn about the models of the software development life cycle. What is a software development life cycle? A software development life cycle, sometimes also called the SDLC life cycle, represents and describes the various activities that are to be performed to build a software product. These activities are grouped into several phases and sequentially linked in order. Hence we can also say, that a software development life cycle is a structured list of activities that are followed to develop software, from the inception to the delivery of the final product. During any phase of the life cycle of development, one or more activities might have to be carried out to start or finish that phase. For example, in the inception phase of actual coding, it is expected that the architectural designing phase is completed. Why software development life cycle model is required? In every model of SDLC, every phase may have its own child life cycle, for every team of a specific skill set. So in an environment of complicated projects and a variety of skill-based teams, it is vital to follow a pre-defined structured process. This creates discipline and maintains decorum in the working culture. All team members are interdependent. Failure of any one team will affect the deliverables of other teams. And all together it might lead to project failures. SDLC also defines entry and exit criteria for every phase. For example, say, if a team member starts coding, assuming that pro-activeness will help finish the project much earlier. This would be the perfect recipe for disaster and project failure. Why? Because, after putting down a month of effort they might realize that the project needs a roving vehicle on Mars to collect data. Unfortunately, the team doesn’t have that with them. So they can not proceed further. That means a feasibility study was not performed before the team started working on deliverables. Which in technical terms, is a breach of SDLC, and hence the loss of effort, or project failure. The team should have done a feasibility study before jumping straight into deliverables. Then they would have realized that the project is not doable, many days in advance. As so, they could have saved some unnecessary effort. Hence it is strongly suggested to follow a methodology, or process while working on complex and team-based projects. It becomes easier for the entire team to work together, support each other, manage, and track the progress of the development. Regardless of the model you follow, SDLC models always ensure smooth delivery, reporting, and chaos-free delivery of the project. Classic Waterfall Model. Prototyping Model. Iterative Waterfall Model. Rapid Action Development. Spiral Model.
Integrated Analysis of Traditional Requirements Engineering Process with Agil...zillesubhan
In the past few years, agile software development approach has emerged as a most attractive software development approach. A typical CASE environment consists of a number of CASE tools operating on a common hardware and software platform and note that there are a number of different classes of users of a CASE environment. In fact, some users such as software developers and managers wish to make use of CASE tools to support them in developing application systems and monitoring the progress of a project. This development approach has quickly caught the attention of a large number of software development firms. However, this approach particularly pays attention to development side of software development project while neglects critical aspects of requirements engineering process. In fact, there is no standard requirement engineering process in this approach and requirements engineering activities vary from situation to situation. As a result, there emerge a large number of problems which can lead the software development projects to failure. One of major drawbacks of agile approach is that it is suitable for small size projects with limited team size. Hence, it cannot be adopted for large size projects. We claim that this approach can be used for large size projects if traditional requirements engineering approach is combined with agile manifesto. In fact, the combination of traditional requirements engineering process and agile manifesto can also help resolve a large number of problems exist in agile development methodologies. As in software development the most important thing is to know the clear customer’s requirements and also through modeling (data modeling, functional modeling, behavior modeling). Using UML we are able to build efficient system starting from scratch towards the desired goal. Through UML we start from abstract model and develop the required system through going in details with different UML diagrams. Each UML diagram serves different goal towards implementing a whole project.
STATISTICAL ANALYSIS FOR PERFORMANCE COMPARISONijseajournal
Performance responsiveness and scalability is a make-or-break quality for software. Nearly everyone runs into performance problems at one time or another. This paper discusses about performance issues faced during Pre Examination Process Automation System (PEPAS) implemented in java technology. The challenges faced during the life cycle of the project and the mitigation actions performed. It compares 3 java technologies and shows how improvements are made through statistical analysis in response time of the application. The paper concludes with result analysis.
Agile development methods are commonly used to iteratively develop the information systems and they can
easily handle ever-changing business requirements. Scrum is one of the most popular agile software
development frameworks. The popularity is caused by the simplified process framework and its focus on
teamwork. The objective of Scrum is to deliver working software and demonstrate it to the customer faster
and more frequent during the software development project. However the security requirements for the
developing information systems have often a low priority. This requirements prioritization issue results in
the situations where the solution meets all the business requirements but it is vulnerable to potential
security threats.
The major benefit of the Scrum framework is the iterative development approach and the opportunity to
automate penetration tests. Therefore the security vulnerabilities can be discovered and solved more often
which will positively contribute to the overall information system protection against potential hackers.
In this research paper the authors propose how the agile software development framework Scrum can be
enriched by considering the penetration tests and related security requirements during the software
development lifecycle. Authors apply in this paper the knowledge and expertise from their previous work
focused on development of the new information system penetration tests methodology PETA with focus on
using COBIT 4.1 as the framework for management of these tests, and on previous work focused on
tailoring the project management framework PRINCE2 with Scrum.
The outcomes of this paper can be used primarily by the security managers, users, developers and auditors.
The security managers may benefit from the iterative software development approach and penetration tests
automation. The developers and users will better understand the importance of the penetration tests and
they will learn how to effectively embed the tests into the agile development lifecycle. Last but not least the
auditors may use the outcomes of this paper as recommendations for companies struggling with
penetrations testing embedded in the agile software development process.
Management Information Systems – Week 7 Lecture 2Developme.docxcroysierkathey
Management Information Systems – Week 7 Lecture 2
Development & Improvement
Chapter 13 Systems Development: Design, Implementation, Maintenance,
and Review
You have learned about information systems and seen a little about how the project is run to create a new
system. This week you will focus on the actual systems design process. This will help you whether you
become a programmer, systems analyst or are a department manager. There are countless articles on
this subject on the internet and some great YouTube videos so take a moment to do some extra research
and learn more about systems development.
When an IS manager sits down to design a system they look at several areas and have many special
tools at their disposal.
A systems engineer or senior developer will first look at the logical design. This usually means that they
look at the user request and determine what they really mean! Once they have clarification they will create
a physical design. This might be object-oriented (using code that has already been created) or mock ups
showing interface design and controls. This is sometimes called storyboarding. This image is an example
of creating a new user interface:
System design time is an investment for the business, it will help by preventing, detecting, and correcting
errors prior to the application software being written. It will generate systems design alternatives. One
alternative is to ask software developers to create the application for the business, this is done by creating
a request for proposal (RFP). Software vendors will then propose several options at various price points.
The business can then review the proposals, do a cost benefit analysis and select an appropriate plan of
action.
Once a project has started it is a good idea to freezing design specifications using a contract, and even a
design report called a Functional Design Document. This process is intended to allow the development
team to focus on creating a specific application and not have to try to hit a constantly moving target. As
the application is being developed it is also time to acquire the hardware that will be needed. If the
application requires a headset with microphone for voice input or a super-fast computer, this is the time to
make sure the application will be functional when it is implemented.
Types of IS hardware vendors include:
General computer manufacturers
Small computer manufacturers
Peripheral equipment manufacturers
Computer dealers and distributors
Chip makers
While the application is being developed and the hardware acquired, in a perfect world the personnel will
be hired and trained and any preparations will be done for the site and data requirements (additional disk
drives for databases or could computing). One of the phases of software development is the testing
phase. It really cannot be considered the final stage because it may result in some additional planning,
programming or other modifications. It can be considered to be ...
1 Network Analysis and Design This assignment is.docxoswald1horne84988
1
Network Analysis and Design
This assignment is worth 30%.
Deadline: Mon, Week 12
Part A: HQ LAN Upgrade (35%)
Background:
ABC is a big company in the US. ABC has employed you as the IT officer of the company.
Your job is to analyse the performance of the HQ LAN, suggest changes to improve the
network performance and provide a report to your boss.
Settings:
Run all simulations for 30 minutes to simulate a working day.
The graphs should be time averaged
Duplicate scenario for each possible setup
Tasks:
1. Analyse the current performance of the HQ LAN for each level and comment on it.
You are required to show all relevant graphs. The graphs for each level can be
overlaid. (10%)
2. Some staffs are unhappy about the speed of the network. Anything that takes more
than 1 second is not desirable. You have decided to try the following to improve the
network performance. Show the relevant graphs and comment on the results: (5%)
a. Increase the link speeds of
i. HQ_Router1 to HQ_Router3 from 1 Gbps to 10 Gbps and
ii. HQ_Router2 to HQ_Router3 from 1 Gbps to 10 Gbps
b. Increase the LANs for level 1, 2 and 3 from 100 Mbps to 1 Gbps
c. Try out 1 other way that meets the requirement.
3. After meeting the requirement, the company has decided to purchase an Ethernet
Server and placed it in the HQ LAN. (10%)
a. Rename it to HQ Server
b. Use a 1Gbps link
c. Set Application: Supported Services to All
d. Set statistics to view the following:
i. Server DB Task Processing Time (Heavy)
ii. Server Email Task Processing Time (Heavy)
iii. Server HTTP Task Processing Time (Heavy)
iv. Server Performance Task Processing Time
e. Show the performance of the HQ Server with the required graphs and
comment on the results
f. Justify the location of the server
g. State at least 3 security measures you will take to protect the HQ LAN from
malicious attacks
4. What would you do so that all the 4 statistics of the HQ server are less than 0.025 s?
Show all relevant graphs. (3 marks)
2
5. Prepare a report and state the additional amount of money that is needed for the
changes you have made to meet the additional requirements. Refer to the given price
list in the Appendix. (7%)
a. Your report should include a content page, a summary of the addressed issues,
objectives, budgeting, proposed solutions and conclusion.
Part B: Network Design (65%)
Background:
Due to your excellent work in the analysis of the HQ LAN, you are now assigned the new
task of designing the LAN for one of ABC’s client, XYZ. The company XYZ is made up of 4
sections and the number of people in each section is as shown below.
1. Research – 20
2. Technical – 10
3. Guests – 4
4. Executives – 2
Set up the following staff profile:
1. Research: file transfer (light), web browsing (heavy) and file print (light)
2. Technical: Database Access (heavy), telnet (heavy) and email (light)
3. Guests: Em.
1 Name _____________________________ MTH129 Fall .docxoswald1horne84988
1
Name: _____________________________
MTH129 Fall 2018 - FINAL EXAM A
Show all work neatly on paper provided. Label all work. Place final answers on the answer sheet.
PART I: Omit 1 complete question. Place an “X” on the problems & answer space you are omitting.
1. Find the inverse of the following functions:
a. 𝑓(𝑥) = 2𝑥 − 3
b. 𝑓(𝑥) =
3𝑥 +1
𝑥−2
2. If 𝑓(𝑥) = 𝑥 2 − 2𝑥 + 3 and 𝑔(𝑥) = −3𝑥 + 4, find the following:
a. (𝑓°𝑔)(𝑥) b. (𝑓°𝑔)(2)
3. Find the domain for the following expression:
a) √𝑥 + 5 𝑏) 7𝑥 2 + 3𝑥 − 1 𝑐)
𝑥 2+4
𝑥 2−9
4. Find the radian measures of the angles with the given degree measures.
a) 81°
Find the degree measures of the angles with the given radian measures.
b)
13𝜋
6
5. Solve the following equations:
a) (5t) = 20
b) 6000 = 40(15)t
6. Expand the following logarithmic expressions:
a. log(𝐴𝐵2 )
b. ln(
4
√3
)
7. Describe how the graph of each function can be obtained from the graph f
a. 𝑦 = 𝑓(𝑥) − 8
b. 𝑦 = 𝑓(𝑥 + 4) − 5
8. A real number t is given 𝑡 =
2𝜋
3
a. Find the reference number for t.
b. Find the terminal point P(x,y) on the unit circle determined by t
c. The unit circle is centered at __________________ and has a radius of _________________
PART II: Omit 1 complete question. Place an “X” on the problems & answer space you are omitting.
2
1. A sum of $7,000 is invested at an interest rate of 4
1
2
% per year, compounding monthly. (round all answers to
the nearest cent)
a. Find the amount of the investment after 2
1
2
years.
b. How long will it take for the investment to amount to $12,000?
c. Using the information in part (a), find the amount of the investment if compounded quarterly.
2. When a company charges price p dollars for one of its products, its revenue is given by
𝑅 = 𝑓(𝑝) = 500𝑝(30 − 𝑝)
a. Create a quadratic function for price with respect to revenue.
b. What price should they charge in order to maximize their revenue?
c. What is the maximum revenue?
d. What would be the revenue if the price was set at $10?
e. Sketch a rough graph – indicate the intercepts and the maximum coordinates.
3. The charges for a taxi ride are an initial charge of $2.50 and $0.85 for each mile driven.
a. Write a function for the charge of a taxi ride as a linear function of the distance traveled.
b. What is the cost of a 12 mile trip?
c. Find the equation of a line that passes through the following points: (1,-2) , (2,5) Express in 𝑦 =
𝑚𝑥 + 𝑏 form
d. Graph part ( c )
4. a. Divide the following polynomial and factor completely.
𝑃(𝑥) = 3𝑥 4 − 9𝑥 3 − 2𝑥 2 + 5𝑥 + 3; 𝑐 = 3
b. Given polynomial−𝑥 2 + 5𝑥 − 6, state the end behavior of its graph.
c. Using the polynomial on part ( c ), would this g
1 Lab 8 -Ballistic Pendulum Since you will be desig.docxoswald1horne84988
1
Lab 8 -Ballistic Pendulum
Since you will be designing your own procedure you will have two
class periods to take the required data.
The goal of this lab is to measure the speed of a ball that is fired
from a projectile launcher using two different methods. The
Projectile launcher has three different settings, “Short Range,”
“Medium Range” and “Long Range,” however you will only need to
determine the speed for any ONE of these Range settings.
Method 1 involves firing the ball directly into the “Ballistic
Pendulum” shown below in Figure 2 for which limited instructions will be provided. Method 2
is entirely up to your group. While you have significant freedom to design your own procedure,
you will need to worry about the random and systematic uncertainties you are introducing
based on your procedure. This manual will provide a few hints to help reduce a few of those
uncertainties.
The ballistic pendulum pictured in Figure 2 is important canonical problem students study to
explore the conservation of momentum and energy. The ball is fired by the projectile launcher
into a “perfectly inelastic collision” with the pendulum. The pendulum then swings to some
maximum angle which is measured by an Angle Indicator.
Caution: The pendulum has a plastic hinge and Angle Indicator which are both fragile. Be
gentle.
Study the ballistic pendulum carefully. Before we begin, here are a few things to consider and
be aware of in Figure 2:
Projectile launcher
Angle indicator (curved
black bar)
Clamp
Pendulum (can be removed
for measurements)
Figure 2: Ballistic Pendulum
Plumb bob
Firing string
Release
point
Figure 1: Projectile Launcher
Bolt for removing pendulum
2
A. Clamping the ballistic pendulum to the table will reduce random uncertainties in the
speed with which the projectile launcher releases the ball. Similarly, you should check
that the various bolts are snug and that the ball is always fully inside the launcher (not
rolling around inside the barrel of launcher).
B. If the lab bench is not perfectly horizontal the plumb bob and angle indicator will not
read zero degrees before you begin your experiment. You should fix AND/OR account
for these discrepancies.
C. In Figure 3 you will notice a tiny gap between the launcher and the pendulum. This
important gap prevents the launcher from contacting the pendulum directly as the ball
is fired. Without this gap an unknown amount of momentum is transferred from the
launcher directly to the pendulum (in addition to the momentum transferred by the
ball) significantly complicating our experiment.
Figure 3: Important gap between Launcher and Pendulum
Equipment
1 Ballistic Pendulum (shown in Figure 2)
A bag with three balls
1 loading rod
1 Clamp
1 triple beam balance scale
Safety goggles for each group member
Any equipment found in your equipment drawer.
Reasonable equipment reque.
1 I Samuel 8-10 Israel Asks for a King 8 When S.docxoswald1horne84988
1
I Samuel 8-10
Israel Asks for a King
8 When Samuel grew old, he appointed his sons as Israel’s leaders.[a]2 The
name of his firstborn was Joel and the name of his second was Abijah, and
they served at Beersheba. 3 But his sons did not follow his ways. They turned
aside after dishonest gain and accepted bribes and perverted justice.
4 So all the elders of Israel gathered together and came to Samuel at
Ramah. 5 They said to him, “You are old, and your sons do not follow your
ways; now appoint a king to lead[b] us, such as all the other nationshave.”
6 But when they said, “Give us a king to lead us,” this displeasedSamuel; so
he prayed to the LORD. 7 And the LORD told him: “Listen to all that the people
are saying to you; it is not you they have rejected, but they have rejected
me as their king. 8 As they have done from the day I brought them up out of
Egypt until this day, forsaking me and serving other gods, so they are doing
to you. 9 Now listen to them; but warn them solemnly and let them
know what the king who will reign over them will claim as his rights.”
10 Samuel told all the words of the LORD to the people who were asking him
for a king. 11 He said, “This is what the king who will reign over you will claim
as his rights: He will take your sons and make them serve with his chariots
and horses, and they will run in front of his chariots. 12 Some he will assign to
be commanders of thousands and commanders of fifties, and others to plow
his ground and reap his harvest, and still others to make weapons of war
and equipment for his chariots. 13 He will take your daughters to be
perfumers and cooks and bakers. 14 He will take the best of your fields and
vineyards and olive groves and give them to his attendants. 15 He will take a
tenth of your grain and of your vintage and give it to his officials and
attendants. 16 Your male and female servants and the best of your cattle[c] and
donkeys he will take for his own use. 17 He will take a tenth of your flocks,
and you yourselves will become his slaves. 18 When that day comes, you will
cry out for relief from the king you have chosen, but the LORD will not
answer you in that day.”
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7371a
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7375b
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7386c
2
19 But the people refused to listen to Samuel. “No!” they said. “We wanta
king over us. 20 Then we will be like all the other nations, with a king to lead
us and to go out before us and fight our battles.”
21 When Samuel heard all that the people said, he repeated it before
the LORD. 22 The LORD answered, “Listen to them and give them a king.”
Then Samuel said to the Israelites, “Everyone go back to your own town.”
Samuel Anoints Saul
9 There was a Benjamite, a man of standing, whose n.
1 Journal Entry #9 What principle did you select .docxoswald1horne84988
1
Journal Entry #9
What principle did you select?
I selected principle 1 of part 1, “Don’t criticize, condemn or complain”.
Who did you interact with?
For this assignment I interacted with my younger cousin.
What was the context?
I had visited my Aunty and she and her husband asked me to stay a while as I was on school
break. They accommodated me and I decided in return to help look after my cousin in the period
when he got out of school and before they got back from work. He is 5 years old and can be quite
the handful.
What did you expect?
I expected that an authoritative approach would easily compel him to follow my instructions so
that the transition from school life into home life would be easy.
What happened?
At first, I used commanding language to get him to change out of his uniform or properly store
his back pack and books before stepping out to play. The first day was difficult and the way I
deal with him were not getting through. On the 2nd day, the same was observed. On the 3rd day,
before he could drop his back pack and run out, I offered to make him a sandwich to eat before
he left to play if he would change and clean up. He rushed up stairs and freshened up. On the
next day, he came home and rushed up to change and freshen up all on his own. I had not
initially offered; but I made him a sandwich regardless.
How did it make you feel?
It made me feel good to be able to get through to my cousin. After this, if I ever needed him to
do something in a better way than previously, I would encourage him onto a different way of
accomplishing the same. I would often offer praise after adoption of the new suggested method
was adopted or offered incentive.
2
What did you learn?
I learnt that in criticizing a person’s action, it is difficult to deter their belief in their methods,
values or beliefs. This usually just gives them the will to justify or defend their positions. It is
almost an exercise in futility to attempt to effect change by complaining, condemning or
criticizing.
What surprised you?
I was surprised by how fast the change was effected after the shift in direction I took to approach
my cousin. In not criticizing his way of doing things any longer and employing a different tactic,
I was able to influence his routine as well as build good rapport with him.
Going forward, how can you apply what you learnt?
Going forward I will attempt to understand that everyone has a belief or image of their own that I
should respect. These beliefs, systems and values are crucial to their inherent dignity and to
criticize or attack this will only fuel conflict.
Running head: Physical activity project 1
Physical activity project:
A 7-day analysis and action plans
Student Name
National University
Physical activity project 2
Introduction
Physical activity (PA) has been a major component of public health since the rise of
chronic illnesses .
More Related Content
Similar to · Stability in the Frequency Domain1. Consider a closed-loop sys.docx
SCRUM has grown in popularity and acceptance by many companies over the world with numbers of registered SCRUM Masters reaching 51,955 (11 March 2009 - Jeff Sutherland). Although SCRUM does not stipulate what tools to use to produce the necessary artifacts, Microsoft Team Foundation System provides a number of features via TFS Explorer that facilitate capturing the artifacts of SCRUM and is a useful tool for any SCRUM Master, Team and Product Owner. This presentation will highlight the SCRUM framework and show you practical use of TFS and other tools that facilitate the ceremonies and artifacts of SCRUM.
DESIGN OF A MULTI-AGENT SYSTEM ARCHITECTURE FOR THE SCRUM METHODOLOGYijseajournal
The objective of this paper is to design a multi-agent system architecture for the Scrum methodology.
Scrum is an iterative, incremental framework for software development which is flexible, adaptable and
highly productive. An agent is a system situated within and a part of an environment that senses the
environment and acts on it, over time, in pursuit of its own agenda and so as to effect what it senses in the
future (Franklin and Graesser, 1996). To our knowledge, this is first attempt to include software agents in
the Scrum framework. Furthermore, our design covers all the stages of software development. Alternative
approaches were only restricted to the analysis and design phases. This Multi-Agent System (MAS)
Architecture for Scrum acts as a design blueprint and a baseline architecture that can be realised into a
physical implementation by using an appropriate agent development framework. The development of an
experimental prototype for the proposed MAS Architecture is in progress. It is expected that this tool will
provide support to the development team who will no longer be expected to report, update and manage
non-core activities daily.
Software Engineering in a Quick and Easy way - v1.pdfKAJAL MANDAL
The Most Common must know Software Development life cycle Models. As we discussed in our earlier article on Software Engineering, we have learned about the aspects of Software Engineering and the qualities that it should possess. Now let us move ahead and learn about the models of the software development life cycle. What is a software development life cycle? A software development life cycle, sometimes also called the SDLC life cycle, represents and describes the various activities that are to be performed to build a software product. These activities are grouped into several phases and sequentially linked in order. Hence we can also say, that a software development life cycle is a structured list of activities that are followed to develop software, from the inception to the delivery of the final product. During any phase of the life cycle of development, one or more activities might have to be carried out to start or finish that phase. For example, in the inception phase of actual coding, it is expected that the architectural designing phase is completed. Why software development life cycle model is required? In every model of SDLC, every phase may have its own child life cycle, for every team of a specific skill set. So in an environment of complicated projects and a variety of skill-based teams, it is vital to follow a pre-defined structured process. This creates discipline and maintains decorum in the working culture. All team members are interdependent. Failure of any one team will affect the deliverables of other teams. And all together it might lead to project failures. SDLC also defines entry and exit criteria for every phase. For example, say, if a team member starts coding, assuming that pro-activeness will help finish the project much earlier. This would be the perfect recipe for disaster and project failure. Why? Because, after putting down a month of effort they might realize that the project needs a roving vehicle on Mars to collect data. Unfortunately, the team doesn’t have that with them. So they can not proceed further. That means a feasibility study was not performed before the team started working on deliverables. Which in technical terms, is a breach of SDLC, and hence the loss of effort, or project failure. The team should have done a feasibility study before jumping straight into deliverables. Then they would have realized that the project is not doable, many days in advance. As so, they could have saved some unnecessary effort. Hence it is strongly suggested to follow a methodology, or process while working on complex and team-based projects. It becomes easier for the entire team to work together, support each other, manage, and track the progress of the development. Regardless of the model you follow, SDLC models always ensure smooth delivery, reporting, and chaos-free delivery of the project. Classic Waterfall Model. Prototyping Model. Iterative Waterfall Model. Rapid Action Development. Spiral Model.
Integrated Analysis of Traditional Requirements Engineering Process with Agil...zillesubhan
In the past few years, agile software development approach has emerged as a most attractive software development approach. A typical CASE environment consists of a number of CASE tools operating on a common hardware and software platform and note that there are a number of different classes of users of a CASE environment. In fact, some users such as software developers and managers wish to make use of CASE tools to support them in developing application systems and monitoring the progress of a project. This development approach has quickly caught the attention of a large number of software development firms. However, this approach particularly pays attention to development side of software development project while neglects critical aspects of requirements engineering process. In fact, there is no standard requirement engineering process in this approach and requirements engineering activities vary from situation to situation. As a result, there emerge a large number of problems which can lead the software development projects to failure. One of major drawbacks of agile approach is that it is suitable for small size projects with limited team size. Hence, it cannot be adopted for large size projects. We claim that this approach can be used for large size projects if traditional requirements engineering approach is combined with agile manifesto. In fact, the combination of traditional requirements engineering process and agile manifesto can also help resolve a large number of problems exist in agile development methodologies. As in software development the most important thing is to know the clear customer’s requirements and also through modeling (data modeling, functional modeling, behavior modeling). Using UML we are able to build efficient system starting from scratch towards the desired goal. Through UML we start from abstract model and develop the required system through going in details with different UML diagrams. Each UML diagram serves different goal towards implementing a whole project.
STATISTICAL ANALYSIS FOR PERFORMANCE COMPARISONijseajournal
Performance responsiveness and scalability is a make-or-break quality for software. Nearly everyone runs into performance problems at one time or another. This paper discusses about performance issues faced during Pre Examination Process Automation System (PEPAS) implemented in java technology. The challenges faced during the life cycle of the project and the mitigation actions performed. It compares 3 java technologies and shows how improvements are made through statistical analysis in response time of the application. The paper concludes with result analysis.
Agile development methods are commonly used to iteratively develop the information systems and they can
easily handle ever-changing business requirements. Scrum is one of the most popular agile software
development frameworks. The popularity is caused by the simplified process framework and its focus on
teamwork. The objective of Scrum is to deliver working software and demonstrate it to the customer faster
and more frequent during the software development project. However the security requirements for the
developing information systems have often a low priority. This requirements prioritization issue results in
the situations where the solution meets all the business requirements but it is vulnerable to potential
security threats.
The major benefit of the Scrum framework is the iterative development approach and the opportunity to
automate penetration tests. Therefore the security vulnerabilities can be discovered and solved more often
which will positively contribute to the overall information system protection against potential hackers.
In this research paper the authors propose how the agile software development framework Scrum can be
enriched by considering the penetration tests and related security requirements during the software
development lifecycle. Authors apply in this paper the knowledge and expertise from their previous work
focused on development of the new information system penetration tests methodology PETA with focus on
using COBIT 4.1 as the framework for management of these tests, and on previous work focused on
tailoring the project management framework PRINCE2 with Scrum.
The outcomes of this paper can be used primarily by the security managers, users, developers and auditors.
The security managers may benefit from the iterative software development approach and penetration tests
automation. The developers and users will better understand the importance of the penetration tests and
they will learn how to effectively embed the tests into the agile development lifecycle. Last but not least the
auditors may use the outcomes of this paper as recommendations for companies struggling with
penetrations testing embedded in the agile software development process.
Management Information Systems – Week 7 Lecture 2Developme.docxcroysierkathey
Management Information Systems – Week 7 Lecture 2
Development & Improvement
Chapter 13 Systems Development: Design, Implementation, Maintenance,
and Review
You have learned about information systems and seen a little about how the project is run to create a new
system. This week you will focus on the actual systems design process. This will help you whether you
become a programmer, systems analyst or are a department manager. There are countless articles on
this subject on the internet and some great YouTube videos so take a moment to do some extra research
and learn more about systems development.
When an IS manager sits down to design a system they look at several areas and have many special
tools at their disposal.
A systems engineer or senior developer will first look at the logical design. This usually means that they
look at the user request and determine what they really mean! Once they have clarification they will create
a physical design. This might be object-oriented (using code that has already been created) or mock ups
showing interface design and controls. This is sometimes called storyboarding. This image is an example
of creating a new user interface:
System design time is an investment for the business, it will help by preventing, detecting, and correcting
errors prior to the application software being written. It will generate systems design alternatives. One
alternative is to ask software developers to create the application for the business, this is done by creating
a request for proposal (RFP). Software vendors will then propose several options at various price points.
The business can then review the proposals, do a cost benefit analysis and select an appropriate plan of
action.
Once a project has started it is a good idea to freezing design specifications using a contract, and even a
design report called a Functional Design Document. This process is intended to allow the development
team to focus on creating a specific application and not have to try to hit a constantly moving target. As
the application is being developed it is also time to acquire the hardware that will be needed. If the
application requires a headset with microphone for voice input or a super-fast computer, this is the time to
make sure the application will be functional when it is implemented.
Types of IS hardware vendors include:
General computer manufacturers
Small computer manufacturers
Peripheral equipment manufacturers
Computer dealers and distributors
Chip makers
While the application is being developed and the hardware acquired, in a perfect world the personnel will
be hired and trained and any preparations will be done for the site and data requirements (additional disk
drives for databases or could computing). One of the phases of software development is the testing
phase. It really cannot be considered the final stage because it may result in some additional planning,
programming or other modifications. It can be considered to be ...
1 Network Analysis and Design This assignment is.docxoswald1horne84988
1
Network Analysis and Design
This assignment is worth 30%.
Deadline: Mon, Week 12
Part A: HQ LAN Upgrade (35%)
Background:
ABC is a big company in the US. ABC has employed you as the IT officer of the company.
Your job is to analyse the performance of the HQ LAN, suggest changes to improve the
network performance and provide a report to your boss.
Settings:
Run all simulations for 30 minutes to simulate a working day.
The graphs should be time averaged
Duplicate scenario for each possible setup
Tasks:
1. Analyse the current performance of the HQ LAN for each level and comment on it.
You are required to show all relevant graphs. The graphs for each level can be
overlaid. (10%)
2. Some staffs are unhappy about the speed of the network. Anything that takes more
than 1 second is not desirable. You have decided to try the following to improve the
network performance. Show the relevant graphs and comment on the results: (5%)
a. Increase the link speeds of
i. HQ_Router1 to HQ_Router3 from 1 Gbps to 10 Gbps and
ii. HQ_Router2 to HQ_Router3 from 1 Gbps to 10 Gbps
b. Increase the LANs for level 1, 2 and 3 from 100 Mbps to 1 Gbps
c. Try out 1 other way that meets the requirement.
3. After meeting the requirement, the company has decided to purchase an Ethernet
Server and placed it in the HQ LAN. (10%)
a. Rename it to HQ Server
b. Use a 1Gbps link
c. Set Application: Supported Services to All
d. Set statistics to view the following:
i. Server DB Task Processing Time (Heavy)
ii. Server Email Task Processing Time (Heavy)
iii. Server HTTP Task Processing Time (Heavy)
iv. Server Performance Task Processing Time
e. Show the performance of the HQ Server with the required graphs and
comment on the results
f. Justify the location of the server
g. State at least 3 security measures you will take to protect the HQ LAN from
malicious attacks
4. What would you do so that all the 4 statistics of the HQ server are less than 0.025 s?
Show all relevant graphs. (3 marks)
2
5. Prepare a report and state the additional amount of money that is needed for the
changes you have made to meet the additional requirements. Refer to the given price
list in the Appendix. (7%)
a. Your report should include a content page, a summary of the addressed issues,
objectives, budgeting, proposed solutions and conclusion.
Part B: Network Design (65%)
Background:
Due to your excellent work in the analysis of the HQ LAN, you are now assigned the new
task of designing the LAN for one of ABC’s client, XYZ. The company XYZ is made up of 4
sections and the number of people in each section is as shown below.
1. Research – 20
2. Technical – 10
3. Guests – 4
4. Executives – 2
Set up the following staff profile:
1. Research: file transfer (light), web browsing (heavy) and file print (light)
2. Technical: Database Access (heavy), telnet (heavy) and email (light)
3. Guests: Em.
1 Name _____________________________ MTH129 Fall .docxoswald1horne84988
1
Name: _____________________________
MTH129 Fall 2018 - FINAL EXAM A
Show all work neatly on paper provided. Label all work. Place final answers on the answer sheet.
PART I: Omit 1 complete question. Place an “X” on the problems & answer space you are omitting.
1. Find the inverse of the following functions:
a. 𝑓(𝑥) = 2𝑥 − 3
b. 𝑓(𝑥) =
3𝑥 +1
𝑥−2
2. If 𝑓(𝑥) = 𝑥 2 − 2𝑥 + 3 and 𝑔(𝑥) = −3𝑥 + 4, find the following:
a. (𝑓°𝑔)(𝑥) b. (𝑓°𝑔)(2)
3. Find the domain for the following expression:
a) √𝑥 + 5 𝑏) 7𝑥 2 + 3𝑥 − 1 𝑐)
𝑥 2+4
𝑥 2−9
4. Find the radian measures of the angles with the given degree measures.
a) 81°
Find the degree measures of the angles with the given radian measures.
b)
13𝜋
6
5. Solve the following equations:
a) (5t) = 20
b) 6000 = 40(15)t
6. Expand the following logarithmic expressions:
a. log(𝐴𝐵2 )
b. ln(
4
√3
)
7. Describe how the graph of each function can be obtained from the graph f
a. 𝑦 = 𝑓(𝑥) − 8
b. 𝑦 = 𝑓(𝑥 + 4) − 5
8. A real number t is given 𝑡 =
2𝜋
3
a. Find the reference number for t.
b. Find the terminal point P(x,y) on the unit circle determined by t
c. The unit circle is centered at __________________ and has a radius of _________________
PART II: Omit 1 complete question. Place an “X” on the problems & answer space you are omitting.
2
1. A sum of $7,000 is invested at an interest rate of 4
1
2
% per year, compounding monthly. (round all answers to
the nearest cent)
a. Find the amount of the investment after 2
1
2
years.
b. How long will it take for the investment to amount to $12,000?
c. Using the information in part (a), find the amount of the investment if compounded quarterly.
2. When a company charges price p dollars for one of its products, its revenue is given by
𝑅 = 𝑓(𝑝) = 500𝑝(30 − 𝑝)
a. Create a quadratic function for price with respect to revenue.
b. What price should they charge in order to maximize their revenue?
c. What is the maximum revenue?
d. What would be the revenue if the price was set at $10?
e. Sketch a rough graph – indicate the intercepts and the maximum coordinates.
3. The charges for a taxi ride are an initial charge of $2.50 and $0.85 for each mile driven.
a. Write a function for the charge of a taxi ride as a linear function of the distance traveled.
b. What is the cost of a 12 mile trip?
c. Find the equation of a line that passes through the following points: (1,-2) , (2,5) Express in 𝑦 =
𝑚𝑥 + 𝑏 form
d. Graph part ( c )
4. a. Divide the following polynomial and factor completely.
𝑃(𝑥) = 3𝑥 4 − 9𝑥 3 − 2𝑥 2 + 5𝑥 + 3; 𝑐 = 3
b. Given polynomial−𝑥 2 + 5𝑥 − 6, state the end behavior of its graph.
c. Using the polynomial on part ( c ), would this g
1 Lab 8 -Ballistic Pendulum Since you will be desig.docxoswald1horne84988
1
Lab 8 -Ballistic Pendulum
Since you will be designing your own procedure you will have two
class periods to take the required data.
The goal of this lab is to measure the speed of a ball that is fired
from a projectile launcher using two different methods. The
Projectile launcher has three different settings, “Short Range,”
“Medium Range” and “Long Range,” however you will only need to
determine the speed for any ONE of these Range settings.
Method 1 involves firing the ball directly into the “Ballistic
Pendulum” shown below in Figure 2 for which limited instructions will be provided. Method 2
is entirely up to your group. While you have significant freedom to design your own procedure,
you will need to worry about the random and systematic uncertainties you are introducing
based on your procedure. This manual will provide a few hints to help reduce a few of those
uncertainties.
The ballistic pendulum pictured in Figure 2 is important canonical problem students study to
explore the conservation of momentum and energy. The ball is fired by the projectile launcher
into a “perfectly inelastic collision” with the pendulum. The pendulum then swings to some
maximum angle which is measured by an Angle Indicator.
Caution: The pendulum has a plastic hinge and Angle Indicator which are both fragile. Be
gentle.
Study the ballistic pendulum carefully. Before we begin, here are a few things to consider and
be aware of in Figure 2:
Projectile launcher
Angle indicator (curved
black bar)
Clamp
Pendulum (can be removed
for measurements)
Figure 2: Ballistic Pendulum
Plumb bob
Firing string
Release
point
Figure 1: Projectile Launcher
Bolt for removing pendulum
2
A. Clamping the ballistic pendulum to the table will reduce random uncertainties in the
speed with which the projectile launcher releases the ball. Similarly, you should check
that the various bolts are snug and that the ball is always fully inside the launcher (not
rolling around inside the barrel of launcher).
B. If the lab bench is not perfectly horizontal the plumb bob and angle indicator will not
read zero degrees before you begin your experiment. You should fix AND/OR account
for these discrepancies.
C. In Figure 3 you will notice a tiny gap between the launcher and the pendulum. This
important gap prevents the launcher from contacting the pendulum directly as the ball
is fired. Without this gap an unknown amount of momentum is transferred from the
launcher directly to the pendulum (in addition to the momentum transferred by the
ball) significantly complicating our experiment.
Figure 3: Important gap between Launcher and Pendulum
Equipment
1 Ballistic Pendulum (shown in Figure 2)
A bag with three balls
1 loading rod
1 Clamp
1 triple beam balance scale
Safety goggles for each group member
Any equipment found in your equipment drawer.
Reasonable equipment reque.
1 I Samuel 8-10 Israel Asks for a King 8 When S.docxoswald1horne84988
1
I Samuel 8-10
Israel Asks for a King
8 When Samuel grew old, he appointed his sons as Israel’s leaders.[a]2 The
name of his firstborn was Joel and the name of his second was Abijah, and
they served at Beersheba. 3 But his sons did not follow his ways. They turned
aside after dishonest gain and accepted bribes and perverted justice.
4 So all the elders of Israel gathered together and came to Samuel at
Ramah. 5 They said to him, “You are old, and your sons do not follow your
ways; now appoint a king to lead[b] us, such as all the other nationshave.”
6 But when they said, “Give us a king to lead us,” this displeasedSamuel; so
he prayed to the LORD. 7 And the LORD told him: “Listen to all that the people
are saying to you; it is not you they have rejected, but they have rejected
me as their king. 8 As they have done from the day I brought them up out of
Egypt until this day, forsaking me and serving other gods, so they are doing
to you. 9 Now listen to them; but warn them solemnly and let them
know what the king who will reign over them will claim as his rights.”
10 Samuel told all the words of the LORD to the people who were asking him
for a king. 11 He said, “This is what the king who will reign over you will claim
as his rights: He will take your sons and make them serve with his chariots
and horses, and they will run in front of his chariots. 12 Some he will assign to
be commanders of thousands and commanders of fifties, and others to plow
his ground and reap his harvest, and still others to make weapons of war
and equipment for his chariots. 13 He will take your daughters to be
perfumers and cooks and bakers. 14 He will take the best of your fields and
vineyards and olive groves and give them to his attendants. 15 He will take a
tenth of your grain and of your vintage and give it to his officials and
attendants. 16 Your male and female servants and the best of your cattle[c] and
donkeys he will take for his own use. 17 He will take a tenth of your flocks,
and you yourselves will become his slaves. 18 When that day comes, you will
cry out for relief from the king you have chosen, but the LORD will not
answer you in that day.”
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7371a
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7375b
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7386c
2
19 But the people refused to listen to Samuel. “No!” they said. “We wanta
king over us. 20 Then we will be like all the other nations, with a king to lead
us and to go out before us and fight our battles.”
21 When Samuel heard all that the people said, he repeated it before
the LORD. 22 The LORD answered, “Listen to them and give them a king.”
Then Samuel said to the Israelites, “Everyone go back to your own town.”
Samuel Anoints Saul
9 There was a Benjamite, a man of standing, whose n.
1 Journal Entry #9 What principle did you select .docxoswald1horne84988
1
Journal Entry #9
What principle did you select?
I selected principle 1 of part 1, “Don’t criticize, condemn or complain”.
Who did you interact with?
For this assignment I interacted with my younger cousin.
What was the context?
I had visited my Aunty and she and her husband asked me to stay a while as I was on school
break. They accommodated me and I decided in return to help look after my cousin in the period
when he got out of school and before they got back from work. He is 5 years old and can be quite
the handful.
What did you expect?
I expected that an authoritative approach would easily compel him to follow my instructions so
that the transition from school life into home life would be easy.
What happened?
At first, I used commanding language to get him to change out of his uniform or properly store
his back pack and books before stepping out to play. The first day was difficult and the way I
deal with him were not getting through. On the 2nd day, the same was observed. On the 3rd day,
before he could drop his back pack and run out, I offered to make him a sandwich to eat before
he left to play if he would change and clean up. He rushed up stairs and freshened up. On the
next day, he came home and rushed up to change and freshen up all on his own. I had not
initially offered; but I made him a sandwich regardless.
How did it make you feel?
It made me feel good to be able to get through to my cousin. After this, if I ever needed him to
do something in a better way than previously, I would encourage him onto a different way of
accomplishing the same. I would often offer praise after adoption of the new suggested method
was adopted or offered incentive.
2
What did you learn?
I learnt that in criticizing a person’s action, it is difficult to deter their belief in their methods,
values or beliefs. This usually just gives them the will to justify or defend their positions. It is
almost an exercise in futility to attempt to effect change by complaining, condemning or
criticizing.
What surprised you?
I was surprised by how fast the change was effected after the shift in direction I took to approach
my cousin. In not criticizing his way of doing things any longer and employing a different tactic,
I was able to influence his routine as well as build good rapport with him.
Going forward, how can you apply what you learnt?
Going forward I will attempt to understand that everyone has a belief or image of their own that I
should respect. These beliefs, systems and values are crucial to their inherent dignity and to
criticize or attack this will only fuel conflict.
Running head: Physical activity project 1
Physical activity project:
A 7-day analysis and action plans
Student Name
National University
Physical activity project 2
Introduction
Physical activity (PA) has been a major component of public health since the rise of
chronic illnesses .
1
HCA 448 Case 2 for 10/04/2018
Recently, a patient was transferred to a cardiac intensive care unit (CICU) at Methodist Hospital.
Methodist is a 250-bed hospital, which is one of five hospitals in the University Health System.
The patient was a retired 72-year-old man, who recently (i.e., 25 days ago) had a mild heart
attack and was treated and released from a sister hospital, which is in the same system as
Methodist Hospital. An otherwise health individual, Mr. Charlie Johnson (a husband, father of 4,
and grandfather of 12) is in now need or lots of medication and a battery of tests. To the nurses
on shift, it appears that the entire Johnson family is in patient’s room watching the clinical staff
treated Mr. Johnson. The family overhears everything and they want to know what is being done
to (and for) their loved one. In addition, they want to know the meaning behind the various beeps
coming from the many machines attached to Mr. Johnson.
Over the past 10 years, the latest U.S. News and World report has ranked Methodist Hospital as
one of the Best Hospitals for Cardiology & Heart Surgery. However, it is important to note that
over the past few years, the unit has dropped in the rankings.
Katherine Ross RN, the patient care director of the CICU, which has 14 beds, has held this post
for two years. (See Figure) The unit has a $20 million budget. Ms. Ross has worked at Methodist
Hospital for 16 years. She spends 50 percent of her time on patient safety, 25 percent on staffing
and recruitment, and 20 percent with nurses in relation to their satisfaction with the work and
with families relative to their satisfaction with care. Ten percent of Ms. Ross’s time is spent on
administrative duties. According to Ms. Ross, “I like is working with exceptional nurses who are
very smart and do what it takes with limited resources. However, we don’t always feel
empowered, despite the existence of shared governance, a structure I help to coordinate.”
2
Relationship with Nurses on the Unit:
Nurses on the unit work a three day a week, 12 hours a shift. Ms. Ross says, “we did an
employee opinion survey that went to all employees on the unit, 50 people in all, but only 13
responded. Some of them weren’t sure who their supervisor was. The employees aren’t happy
but our patients are happy.” She adds that “my name is on the unit, not the medical director’s. If
anything goes wrong with the unit, they blame it on nursing. Yet I’m brushed off by people
whom I have to deal with outside of the unit. For example, we have a problem with machines
that analyze blood gases. I spoke with the people there about the technology. This was four
weeks ago. It’s a patient safety issue. I sent them e-mails. I need the work to get done, the staff
don’t feel empowered if I’m not empowered. This goes for other departments as well. For
example, respiratory therapy starts using a new ventilator witho.
1
HC2091: Finance for Business
Trimester 2 2018
Group Assignment
Assessment Value: 20%
Due Date: Sunday 23:59 pm, Week 10
Group: 2- 4 students
Length: Min 2500 words
INSTRUCTIONS
Students are required to form a group to study, undertake research, analyse and conduct academic
work within the areas of business finance covered in learning materials Topics 1 to 10 inclusive.
The assignment should examine the main issues, including underlying theories, implement
performance measures used and explain the firm financial performance. Your group is strongly
advised to reference professional websites, journal articles and text books in this assignment (case
study).
Tasks
This assessment task is a written report and analysis of the financial performance of a selected
listed company on the ASX in order to provide financial and investment advice to a wealthy
investor. This assignment requires your group to undertake a comprehensive examination of a
firm’s financial performance based on update financial statements of the chosen companies.
Group Arrangement
This assignment must be completed IN Group. Each group can be from 2 to maximum 4 student
members. Each group will choose 1 company and once the company has been chosen, the other
group cannot choose the same company. First come first served rule applies here, it means you
need to form your group, choose on company from the list of ASX and register them with your
lecturer as soon as possible. Once your lecturer registers your chosen company, it cannot be
chosen by any other group. Your lecturer then will put your group on Black Board to enable you
to interact and discuss on the issues of your group assignment using Black Board environment.
However, face to face meeting, discussion and other methods of communication are needed to
ensure quality of group work. Each group needs to have your own arrangement so that all the
group members will contribute equally in the group work. If not, a Contribution Statement,
which clearly indicated individual contribution (in terms of percentage) of each member, should
be submitted as a separate item in your assignment. Your individual contribution then will be
assessed based on contribution statement to avoid any free riders.
2
Submission
Please make sure that your group member’s name and surname, student ID, subject name, and
code and lecture’s name are written on the cover sheet of the submitted assignment.
When you submit your assignment electronically, please save the file as ‘Group Assignment-
your group name .doc’. You are required to submit the assignment at Group Assignment
Final Submission, which is under Group Assignment and Due Dates on Black Board.
Submitted work should be your original work showing your creativity. Please ensure the self-
check for plagiarism to be done before final submission (plagiarism check is not over 30% .
1 ECE 175 Computer Programming for Engineering Applica.docxoswald1horne84988
1
ECE 175: Computer Programming for Engineering Applications
Homework Assignment 6
Due: Tuesday March 12, 2019 by 11.59 pm
Conventions: Name your C programs as hwxpy.c where x corresponds to the homework number and y
corresponds to the problem number. For example, the C program for homework 6, problem 1 should be
named as hw6p1.c.
Write comments to your programs. Programs with no comments will receive PARTIAL credit. For each
program that you turn in, at least the following information should be included at the top of the C file:
- Author and Date created
- Brief description of the program:
- input(s) and output(s)
- brief description or relationship between inputs and outputs
Submission Instructions: Use the designated Dropbox on D2L to submit your homework.
Submit only the .c files.
Problem 1 (15 points) Write a program that returns the minimum value and its location, max
value and its location and average value of an array of integers. Your program should call a
single function that returns that min and its location, max and its location and mean value of
the array. Print the results in the main function (not within the array_func function).
See sample code execution below. The declaration of this function is given below:
void array_func (int *x, int size, int *min_p, int *minloc_p, int *max_p, int *maxloc_p, double *mean_p)
/* x is a pointer to the first array element
size is the array size
min_p is a pointer to a variable min in the main function that holds the minimum
minloc_p is a pointer to a variable minloc in the main function that holds the location where the
minimum is.
max_p is a pointer to a variable max in the main function that holds the maximum
maxloc_p is a pointer to a variable maxloc in the main function that holds the location where the
maximum is.
mean_p is a pointer to a variable mean in the main function that holds the mean */
Declare the following array of integers within the main function:
Sample code execution:
int data_ar[] = { -3, 5, 6, 7, 12, 3, 4, 6, 19, 23, 100, 3, 4, -2, 9, 43, 32, 45,
32, 2, 3, 2, -1, 8 };
int data_ar2[] = { -679,-758,-744,-393,-656,-172,-707,-32,-277,-47,-98,-824,-695,
-318,-951,-35,-439,-382,-766,-796,-187,-490,-446,-647};
int data_ar3[] = {-142, -2, -56, -60, 114, -249, 45, -139, -25, 17, 75, -27, 158,
-48, 33, 67, 9, 89, 33, -78, -180, 186, 218, -274};
2
Problem 2 (20 points): A barcode scanner verifies the 12-digit code scanned by comparing the
code’s last digit to its own computation of the check digit calculated from the first 11 digits as
follows:
1. Calculate the sum of the digits in the odd-numbered indices (the first, third, …, ninth
digits) and multiply this sum by 3.
2. Calculate the sum of the digits in the even-numbered indices (the 0th, second, … tenth
digits).
3. Add the results from step 1 and 2. If the last digit of the addition result is 0, then 0 is the
check digit. .
1 Cinemark Holdings Inc. Simulated ERM Program .docxoswald1horne84988
1
Cinemark Holdings Inc.: Simulated ERM Program
Ben Li, Assistant Vice President of Compliance, is assigned the responsibility of developing an ERM
program at Cinemark Holdings Inc. (CHI). Over the past year, Ben has put in place the following ERM
activities:
Risk Identification and Assessment
The risk identification and assessment process steps are as follows:
1) Conduct online surveys of the heads of the 10 business segments and their 1-2 direct reports (15
people) and their mid-level managers (80 people). Exhibit 1 shows the instructions that are
included in the online survey. Exhibit 2 shows samples of the information collected from the
online survey.
2) Each of the 10 business segments separately organizes and compiles the results of the online
survey. They typically compile a robust list of 70-80 potential key risks. Each business segment
then prioritizes their top-5 risks and reports them to Ben Li, resulting in a total of 50 key risks (a
partial sample of the top-50 risk list is shown in Exhibit 3).
3) A consensus meeting is conducted where the 50 risks are shared with the top 10 members of
senior management in an open-group setting at an offsite one-day event. The 50 risks are each
discussed one at a time, after which the facilitator has the group collectively discuss and score
them for likelihood and severity. The risk ranking is calculated as the likelihood score plus the
severity score; the control effectiveness score is used to determine if there is room to improve
the controls and is used in the risk decision making process step. The top-20 risks are identified
as the key risks to CHI and are selected for additional mitigation and advanced to the risk
decision making stage. A Heat Map (see Exhibit 4) is provided to assist in this effort.
4) The 30 risks remaining from the 50 discussed at the consensus meeting are considered the non-
key risks, and these are monitored with key risk indicators to see if, over time, either the
likelihood and/or severity is increasing to the level which would result in one of these being
elevated to a key risk.
Risk Decision Making
Ben Li formed a Risk Committee to look at the risk identification and assessment information and to
define CHI’s risk appetite and risk limits, which were defined as follows:
Risk Appetite
CHI will maintain its overall risk profile in a manner consistent with our mission and vision and with the
expectations of our shareholders.
Risk Limits
CHI will also avoid any individual risk exposures deemed excessive by its Risk Committee; the individual
risk exposures will be determined separately for each key risk. CHI has zero tolerance for risks related to
internal fraud or violations of the employee code of conduct.
2
Ben Li expanded the role of the Risk Committee to also select and implement the risk mitigation for each
of the 20 key risks, at the same time as the committee determines the risk limits. .
1 Figure 1 Picture of Richard Selzer Richard Selz.docxoswald1horne84988
1
Figure 1 Picture of Richard Selzer
Richard Selzer
What I Saw at the Abortion
I am a surgeon. Sick flesh is everyday news. Escaping blood, all the outpourings of
disease, meaty tumors that terrify–I touch these to destroy them. But I do not make symbols of
them.
What I am saying is that I have seen and I am used to seeing. I am a man who has a
trade, who has practiced it long enough to see no news in any of it. Picture me, then. A
professional in his forties, three children, living in a university town—so, necessarily, well—
enlightened? Enough, anyhow. Successful in my work, yes. No overriding religious posture.
Nothing special, then, your routine fellow, trying to do his work and doing it well enough. Picture
me, this professional, a sort of scientist, if you please, in possession of the standard admirable
opinions, positions, convictions, and so on–on this and that matter–on abortion, for example.
All right. Now listen.
It is the western wing of the fourth floor of a great university hospital. I am present
because I asked to be present. I wanted to see what I had never seen: an abortion.
The patient is Jamaican. She lies on the table in that state of notable submissiveness I
have always seen in patients. Now and then she smiles at one of the nurses as though
acknowledging a secret.
A nurse draws down the sheet, lays bare the abdomen. The belly mounds gently in the
twenty-fourth week of pregnancy. The chief surgeon paints it with a sponge soaked in red
antiseptic. He does this three times, each time a fresh sponge. He covers the area with a sterile
sheet, an aperture in its center. He is a kindly man who teaches as he works, who pauses to
reassure the woman.
He begins.
“A little pinprick,” he says to the woman. He inserts the point of a tiny needle at the
midline of the lower portion of her abdomen, on the downslope. He infiltrates local anesthetic into
the skin, where it forms a small white bubble.
The woman grimaces. “That is all you will feel,” the doctor says, “except for a little
pressure. But no more pain.” She smiles again. She seems to relax. She settles comfortably on
the table. The worst is over.
The doctor selects a three-and-one-half-inch needle bearing a central stylet. He places
the point at the site of the previous injection. He aims it straight up and down, perpendicular.
Next he takes hold of her abdomen with his left hand, palming the womb, steadying it. He thrusts
with his right hand. The needle sinks into the abdominal wall.
“Oh,” says the woman quietly.
But I guess it is not pain she feels. It is more a recognition that the deed is being done. Another
thrust and he has speared the uterus.
“We are in,” he says. He has felt the muscular wall of the organ gripping the shaft of his
needle. A further slight pressure on the needle advances it a bit more. He takes his left hand
2
from the woman’s abdomen. He retracts the filament of the stylet from the bar.
1 Films on Africa 1. A star () next to a film i.docxoswald1horne84988
1
Films on Africa
1. A star (*) next to a film indicates that portions of that film might be shown in class in the course of
the semester.
2. All films are in DVD format, unless indicated otherwise.
3. Available: at the Madden and Fresno County Public Libraries, via Netflix, Blackboard or on-line.
4. For the on-line films, you can click on the link and this will lead you directly to the film.
5. Please be advised that a few films have the following notice: Warning: Contains scenes which some
viewers may find disturbing. You decide whether you want to watch them or not.
6. Some films are available on-line via VOD.
7. Let your instructor know if a link is no longer working.
The Africans (9 VHS films – each 60 min or 5 DVDs – each 120 min): Co-
production of WETA-TV and BBC-TV. Presented by Ali A. Mazrui. 1986.
Available at Madden Media & Fresno Public Libraries
Vol. 1 – The Nature of a continent*
Summary: Examines Africa as the birthplace of humankind and discusses
the impact of geography on African history, including the role of the Nile
in the origin of civilization and the introduction of Islam to Africa through its Arabic borders.
Vol. 2 – A Legacy of lifestyles*
Summary: This program explores how African contemporary lifestyles are influenced by
indigenous, Islamic and Western factors. It compares simple African societies with those that
are more complex and centralized, and examines the importance of family life.
Vol. 3 – New gods
Summary: This program examines the factors that influence religion in Africa, paying particular
attention to how traditional religions, Islam, and Christianity co-exist and influence each other.
Vol. 4 – Tools of exploitation
Summary: The impact of the West on Africa and the impact of Africa on the development of the
West are contrasted with an emphasis on the manner in which Africa's human and natural
resources have been exploited before, during, and after the colonial period.
Vol. 5 – New conflicts
Summary: Explores the tensions inherent in the juxtaposition of 3 African heritages, looking at
the ways in which these conflicts have contributed to the rise of the nationalist movement, the
warrior tradition of indigenous Africa, the jihad tradition of Islam, and modern guerilla warfare.
Vol. 6 – In search of stability
Summary: Gives an overview of the several means of governing in Africa. Examines new social
orders to illustrate an Africa in search of a viable form of government in the post-independence
period.
1.
2
Vol. 7 – A Garden of Eden in decay?
Summary: Identifies the problems of a continent that produces what it does not consume and
consumes what it does not produce. Shows Africa's struggle between economic dependence
and decay.
Vol. 8 – A Clash of cultures*
Summary: Discusses the conflicts and compromises which emerge from the coexistence of
many African traditions and modern life. Explores the question of whet.
1 Contemporary Approaches in Management of Risk in .docxoswald1horne84988
1
Contemporary Approaches in Management of Risk in Engineering Organizations
Assignment-1
Literature review
Student name: Hari Kiran Penumudi
student id: 217473484
Table of Contents
2
INTRODUCTION………………………………………………………………………3-4
OBJECTIVES & DELIVERABLES…………………………………………………....4
REVIEW OF LITERATURE…………………………………………………………....5-13
Risk and Risk Management………………………………………………………5-6
Risk Management Frameworks……………………………………………….....6-10
Importance of Risk Management in Engineering………………………….........10-13
GENERAL PROBLEM STATEMENT…………………………………………………13-14
RESEARH STRATEGY…………………………………………………………………14-15
RESOURCES REQUIREMENTS……………………………………………………….16
PROJECT PLANNING…………………………………………………………………..16
REFERNCES…………………………………………………………………………….17-19
Contemporary Approaches in Management of Risk in Engineering Organizations
3
Introduction
The term, ‘risk’ as defined by the Oxford English dictionary is a possibility to meet with any
kind of danger or suffer harm. Risk is a serious issue that every organization has to deal with in
their everyday operations. However, nature and magnitude of risks largely vary from
organization to organization and often depend on the type of the organization. Therefore,
organizations irrespective of their type of operations keep a risk management team that looks
after every risk to which an organization is vulnerable. Organizations in the field of engineering
also have to come across some inherent risks that negatively impact their operations. Engineering
may be defined as the process of applying science to practical purposes of designing structures,
systems, machines and similar things. Therefore, like every other organization, risk assessment
and management is also an integral part of engineering organizations. Since the task of
engineering is mostly complex, the risks in this area are also very complicated. If risks in
engineering field are not mitigated effectively it may produce long-term danger that may affect
both the organizational services and the society in whole. Hence, the activity of risk management
within engineering organizations must be undertaken seriously and measured thoroughly in order
to reduce the threat of risks. Amyotte et al., (2006) simply puts it like within the engineering
practice, an inbuilt risk is always present. Studies have found that despite the knowledge of
inherent risks within the field and activity of engineering, organizations are not very aware in
imparting knowledge about risk management to their engineers. From this the need of education
regarding the risk management approaches arises. Therefore, this paper tries to find out
approaches to management of risks and importance of these approaches within the area of
engineering. Bringing on the contemporary evidence from the literature review related to risk
management approaches, the paper examines how those approaches can be helpful for
4 .
1
Assignment front Sheet
Qualification Unit number and title
Pearson BTEC Levels 4 and 5 Higher
Nationals in Health and Social Care (RQF)
HNHS 17: Effective Reporting and Record-keeping in
Health and Social Care Services
Student name Assessor name Internal Verifier
B. Maher F. Khan
Date issued: Final Submission:
12/10/2018 18/01/2019
Assignment title
Effective Reporting and Record-keeping in Health and Social
Care services
Submission Format
This work will be submitted in 2 different formats:
Assessment 1 should be submitted as a word-processed report document in a standard report
style, which requires the use of headings, titles and appropriate captions. You may also choose
to include pictures, graphs and charts where relevant to support your work. The recommended
word count for this assignment is 1500–2000 words, though you will not be penalised for
exceeding this total.
Assessment 2 requires the submission of evidence from a mock training event on record-
keeping. This will include a set of materials used in the event, to include an electronic
presentation, evidence of your own record-keeping across a range of types of records, as well as
where you will demonstrate you have evaluated the effectiveness of your own completion of
relevant records. The recommended word count for the presentation is 1000–1500 words
(including speaker notes), though you will not be penalised for exceeding this total.
For both assessments, any material that is derived from other sources must be suitably
referenced using a standard form of citation. Provide a bibliography using the Harvard
referencing system.
Unit Learning Outcomes
LO1 Describe the legal and regulatory aspects of reporting and record keeping in a care setting
LO2 Explore the internal and external recording requirements in a care setting
Assignment Brief and Guidance
2
Purpose of this assignment:
The purpose of the assignment is to assess the learner firstly in relation to both the legal and
regulatory aspects of reporting and record keeping in a care setting through producing an internal
evaluative review of record keeping in their own care setting. Secondly, the learner will be
assessed on the internal and external recording requirements in a care setting. Thirdly, the learner
will be assessed on Review the use of technology in reporting and recording service user care in a
care setting and fourthly the learner will demonstrate how to keep and maintain records in own care
setting in line with national and local policies.
Breakdown of assignment:
Assignment:
You need to produce one written piece of work of 2,500 words (+/- 10%) covering all the
assessment criterion in LO1-LO4 as one document.
Unit Learning Outcomes
LO1 Describe the legal and regulatory aspects of reporting and record keeping in a care
setting
LO2 Explore the internal and external recording.
1 BBS300 Empirical Research Methods for Business .docxoswald1horne84988
1
BBS300 Empirical Research Methods for Business
TSA, 2018
Assignment 1
Due: Sunday, 7 October 2018,
23:55 PM
This assignment covers material from Sessions 1-4 and is worth 20% of your total mark
of BBS300. Your solutions should be properly presented, and it is important that you
double-check your spelling and grammar and thoroughly proofread your assignment
before submitting. Instructions for assignment submission are presented in
the “Assignment 1” link and must be strictly adhered to. No marks will be
awarded to assignments that are submitted after the due date and time.
All analyses must be carried out using SPSS, and no marks will be awarded
for assignment questions where SPSS output supporting your answer is not
provided in your Microsoft Word file submitted for the Assignment.
Questions
In this assignment, we will examine the “Real Estate Market” dataset (described at the
end of the assignment ) and “Employee Satisfaction” dataset. Before beginning the
assignment, read through the descriptions of these dataset and their variables carefully.
The “Real Estate Market” dataset can be found in the file “realestatemarket.sav,” and
the “Employee Satisfaction” dataset can be found in the file “employeesatisfaction.sav.”
You will need to carefully inspect both SPSS data files to be sure that the
specification of variable types is correct and, where appropriate, value
labels are entered.
1. (12 marks)
2
Use appropriate graphical displays and measures of centrality and dispersion
to summarise the following four variables in the “Real Estate Market” dataset. For
graphical displays for numeric data, be sure to comment on not only the shape of
the distribution but also compliance with a normal distribution. Be sure to
include relevant SPSS output (graphs, tables) to support your answers.
(a) Price.
(b) Lot Size.
(c) Material.
(d) Condition.
2. (8 marks)
Again consider the variable Price, which records the property price (in AUD). It
is of interest to know if this is associated with the distance of the property is
located to the train station. It i s al so of i nter e st t o kn o w if th e p rop ert y
pri ce s are a sso ciate d with di st an ce to t h e ne ar e st b u s sto p. Carry out
appropriate statistical techniques to assess whether there is a significant
association between the property price and distance to the nearest train (To train)
station and the nearest bus stop (To bus). Be sure to thoroughly assess the
assumptions of your particular analysis, and be sure to include relevant SPSS
output (graphs, tables) to support your answers.
3. (7 marks)
Consider the “Employee Satisfaction” dataset, which asked participants to provide their
level of regularity to a series of thirteen statements. Conduct an appropriate analysis
to assess the reliability of responses to these statements. If the reliability will
increa.
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docxoswald1horne84988
1
ASSIGNMENT 7 C – MERGING DATA FILES IN STATA
Download the world development data covering the years 2000-2016 from the website
“http://databank.worldbank.org/data/reports.aspx?source=World-Governance-Indicators” for the
following upper-middle-income countries.
Countries of Interest:
Albania Ecuador Montenegro
Algeria Equatorial Guinea Namibia
American Samoa Fiji Nauru
Argentina Gabon Panama
Azerbaijan Grenada Paraguay
Belarus Guyana Peru
Belize Iran, Islamic Rep. Romania
Bosnia and Herzegovina Iraq Russian Federation
Botswana Jamaica Samoa
Brazil Kazakhstan Serbia
Bulgaria Lebanon South Africa
China Libya St. Lucia
Colombia Macedonia, FYR St. Vincent and the Grenadines
Costa Rica Malaysia Suriname
Croatia Maldives Thailand
Cuba Marshall Islands Tonga
Dominica Mauritius Turkey
Dominican Republic Mexico Turkmenistan
Tuvalu
Venezuela, RB
Variables of Interest
Control of Corruption: Estimate
Government Effectiveness: Estimate
Political Stability and Absence of Violence/Terrorism:
Estimate
Regulatory Quality: Estimate
Rule of Law: Estimate
Voice and Accountability: Estimate
2
STEP 1 - Download the data from the World-Governance-Indicators database as shown below
STEP 2 - Check the variables of interest
3
Please make sure you are checking the variables with “Estimates”.
TO VIEW THE DEFINITIONS OF THE VARIABLES
4
Step 3 – Select countries of interest
5
Step 4 – Click on “Time” and select the “year range” you are interested in (2000-2016)
6
Step 5 – Click on the “Layout” as shown below
Change the time layout to “Row,” series to “Column” and Country to “Row.”
Next, click on the “apply changes.”
Step 6 – Click on the “Download option” and select “Excel” as shown below
7
STEP 7: Using Excel, Replace the Missing Values With “.” (See previous assignments)
STEP 8: SAVE THE EXCEL DATA FILE ON YOUR COMPUTER PREFERABLY IN A
FOLDER
STEP 9: IMPORT YOUR DATA INTO STATA AND NAME YOUR DATA SET
“WORLD_GOVERNANCE_INDICATORS.” (See previous assignments for steps)
8
STEP 10; RENAME THE VARIABLES AS SHOWN BELOW (See previous assignments for
steps)
Using stata, merge the data set from “ASSIGNMENT 3B” with this dataset
VERY IMPORTANT Note: Merging two datasets requires that both have at least one variable in
common (either string or numeric).
This statement requires that the variable name for “Time” and “Country” should be the same in the two
data set
MERGING THE DATASET FROM “ASSIGNMENT 3” WITH THE DATA FROM THE
WORLD GOVERNANCE INDICATORS
Merging data files in stata
https://www.youtube.com/watch?v=EV-5PztbHs0
https://www.youtube.com/watch?v=Uh7C0mlhB3g&t=54s
https://www.youtube.com/watch?v=2etG_34ODoc
I will strongly encourage you to watch these videos before merging
I will also strongly recommend you read the notes in the link below before you star.
1 Assessment details for ALL students Assessment item.docxoswald1horne84988
1
Assessment details for ALL students
Assessment item 3 - Individual submission
Due date: Week 12 Monday (1 Oct 2018) 11:55 pm AEST
Weighting:
Length:
50% (or 50 marks)
There is no word limit for this report
Objectives
This assessment item relates to the unit learning outcomes as stated in the unit profile.
Enabling objectives
1. Analyse a case study and identify issues associated with the business;
2. Develop and deploy the application in IBM Bluemix;
3. Evaluate existing and new functionalities to address business problems;
4. Prepare a document to report your activities using text and multimedia (for example screenshots, videos).
General Information
The purpose of this assignment is to create a cloud based simulating environment which will help to
identify/understand the problem stated in the given case study using analysis tools available in IBM
Bluemix. In assignment three, you are working individually. By doing this assignment, you will
learn to use skills and knowledge of emerging technologies like cloud computing, IoT, to simulate a
business scenario to capture operational data and share with a visualization tool. You will acquire a
good understanding of smart application design in a cloud environment for efficient application
configuration and deployment.
What do you need to do?
The assignment requires you to do the following -
• Download the ‘Starter_Code_For_Assignment_Three.rar’ given in week 8 to
configure, and deploy a cloud based smart/IoT (Internet of Things) application to
simulate the business case.
• Choose a case study out of given two below and analyse the case study to
understand the business problem and design a solution for those problems.
• Deploy the starter source code in your Bluemix account and modify it to address
all required milestones mentioned in your chosen case study.
• Finally prepare a report according to given format and specifications below and
submit it in Moodle.
2
Report format and specifications -
You are required to submit a written report in a single Microsoft Word (.doc or .docx)
document. There is no word limit but any unnecessary information included in the report
may result in reduced marks.
The report must contain the following content (feel free to define your own sections,
as long as you include all the required content):
o Cover page/title page and Table of contents
o URL of the app and login details of the IBM Bluemix account
o Introduction
o Case study analysis which will report –
o Business problems you have identified in the case study
o Possible solutions for each and how do these solutions address the
business problems?
o What are the solutions you implemented in the application?
o The step by step process you have followed to configure and deploy the smart app
for business case simulation. You may choose to use screenshots and notes to
enrich your report but you must have a video of the pr.
1
CDU APA 6th
Referencing Style Guide
(February 2019 version)
2
Contents
APA Fundamentals .......................................................................................... 3
Reference List ................................................................................................... 3
Citing in the text ............................................................................................... 5
Paraphrase ................................................................................................... 5
Direct quotes................................................................................................. 5
Secondary source .......................................................................................... 6
Personal communications............................................................................. 6
Examples .......................................................................................................... 7
Book .............................................................................................................. 7
eBook ............................................................................................................ 7
Journal article with doi ................................................................................ 7
Journal article without doi ........................................................................... 7
Web page ...................................................................................................... 7
Books - print and online ................................................................................... 8
Single author ................................................................................................ 8
eBook/electronic book ................................................................................ 11
Journal articles, Conference papers and Newspaper articles ........................ 13
Multimedia ..................................................................................................... 16
YouTube or Streaming video ..................................................................... 16
Online images ................................................................................................. 17
Web sources and online documents ................................................................ 20
Web page .................................................................................................... 20
Document from a website ........................................................................... 21
Legislation and cases ...................................................................................... 23
Common abbreviations .................................................................................. 24
Appendix 1: How to write an APA reference when information is missing .. 25
Appendix 2: Author layout.
1
BIOL 102: Lab 9
Simulated ABO and Rh Blood Typing
Objectives:
After completing this laboratory assignment, students will be able to:
• explain the biology of blood typing systems ABO and Rh
• explain the genetics of blood types
• determine the blood types of several patients
Introduction:
Before Karl Landsteiner discovered the ABO human blood groups in 1901, it was thought that all blood was the
same. This misunderstanding led to fatal blood transfusions. Later, in 1940, Landsteiner was part of a team
who discovered another blood group, the Rh blood group system. There are many blood group systems known
today, but the ABO and the Rh blood groups are the most important ones used for blood transfusions. The
designation Rh is derived from the Rhesus monkey in which the existence of the Rh blood group was
discovered.
Although all blood is made of the same basic elements, not all blood is alike. In fact, there are eight different
common blood types, which are determined by the presence or absence of certain antigens – substances that
can trigger an immune response if they are foreign to the body – on the surface of the red blood cells (RBCs
also known as erythrocytes).
ABO System:
The antigens on RBCs are agglutinating antigens or agglutinogens. They have been designated as A and B.
Antibodies against antigens A and B begin to build up in the blood plasma shortly after birth. A person
normally produces antibodies (agglutinins) against those antigens that are not present on his/her erythrocytes
but does not produce antibodies against those antigens that are present on his/her erythrocytes.
• A person who is blood type A will have A antigens on the surface of her/his RBCs and will have
antibodies against B antigens (anti-B antibodies). See picture below.
• A person with blood type B will have B antigens on the surface of her/his RBCs and will have antibodies
against antigen A (anti-A antibodies).
• A person with blood type O will have neither A nor B antigens on the surface of her/his RBCs and has
BOTH anti-A and anti-B antibodies.
• A person with blood type AB will have both A and B antigens on the surface of her/his RBCs and has
neither anti-A nor anti-B antibodies.
The individual’s blood type is based on the antigens (not the antibodies) he/she has. The four blood groups
are known as types A, B, AB, and O. Blood type O, characterized by an absence of A and B agglutinogens, is
the most common in the United States (45% of the population). Type A is the next in frequency, found in 39%
of the population. The incidences of types B and AB are 12% and 4%, respectively.
2
Table 1: The ABO System
Blood
Type
Antigens on
RBCs
Antibodies
in the Blood
Can GIVE Blood
to Groups:
Can RECEIVE
Blood from Groups:
A A Anti-B A, AB O, A
B B Anti-A B, AB O, B
AB A and B
Neither anti-A
nor anti-B
AB O, A, B, AB
O
Neither A nor
B
Both anti-A.
1
Business Intelligence Case
Project Background
Mell Industries is a national manufacturing firm that specializes in textiles based out of
Chicago. Starting out as a small factory in Warrenville, Illinois, the firm experienced a period of steady
growth over the past twenty-four years. Steadily opening new warehouses and factories in the
surrounding areas in Michigan and Indianapolis until eventually moving their base of operations to
Chicago. Due to this expansion, Mell Industries is at the height of its production and hopes to avoid any
interferences or deceleration of growth.
In recent years, the firm has been under heavy media scrutiny for supposedly compensating its
female staff unfairly lower compared to male counterparts. This was initiated when a disgruntled
employee leaked the company payroll allegedly showcasing an unjust gap of income between the
female employee and her male counterpart. This type of gender pay gap is highly criticized and as a
precaution, Mell Industries has hired Cal Poly Pomona to conduct research to determine the validity of
these claims. Mell Industries has provided Cal Poly Pomona with a data set of a sample population of
747 employees. Mell Industries has also offered Cal Poly Pomona compensation for any promising
information gathered. Mell Industries may use information gathered from this project in future
employee compensation decisions.
The initial dataset has been given to you in the form of an excel spreadsheet titled
Case_dataset.xlsx consisting of 12 columns labeled:
● Column A - Employee ID
● Column B - Gender
● Column C - Date of Birth
● Column D - Date of Hire
● Column E - Termination Date
● Column F - Occupation
● Column G - Salary
● Column H to L - Employee Evaluation Metrics
In addition, Mell Industries provided the latest annual employee performance review evaluation
results rating each employee in various performance categories. They have turned over this information
separately and as a consultant, it is your task to provide Mell Industries with the most accurate and
relevant information in a digestible form. Furthermore, using excel skills learned during the course, you
will manipulate and analyze the data set in order to make appropriate managerial decisions. You will
utilize excel functions highlighted in this project as well as a pivot table and chart to form a decision
support system in order to answer the critical thinking questions.
Project Objective
The purpose of this project is to perform a methodical data analysis to assist the company make
an informed decision. This could also serve as a basis for implementing critical adjustments to certain
business aspects if necessary. Illustrate the business process by condensing a large set of data, to
present relevant information with data visualization. We will be utilizing Microsoft Excel 2016 to
complete this project.
2
TA.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
· Stability in the Frequency Domain1. Consider a closed-loop sys.docx
1. · Stability in the Frequency Domain
1. Consider a closed-loop system that has the loop transfer
function L(s) = Gc(s)G(s) = Ke-TS / s
1. Determine the gain K so that the phase margin is 60 degrees
when T = 0.2.
2. Plot the phase margin versus the time delay T for K as in part
(a).
2. Include all MATLAB code, calculations and screenshots in a
Word entitled “Lab6_StudentID”.
3. Upload file “Lab6_StudentID”
Shipping SaaS 1
SWE482-1801A-01
Software Engineering Capstone II
Shipping SaaS Team Project
Blake Foster, Courie Gomez, James Allendoerfer, Joseph
Robinson, Terelle Allen
With additional contributions by Phillip Hart and Destiny
Barrera
1/10/2018
Table of Contents
Project Outline 3
2. Development Methodology 7
Requirements 9
Design 12
Development and Testing 18
Project Schedule 29
Risk Analysis 36
References 39
Project Outline
*Portions of this section have been repurposed from SWE481-
1704B-01 Unit 1 Group Project Proposal
CTU Regional has commissioned the design and implementation
of an inventory tracking and shipping service. The service is
needed as a centralized stateless/RESTful SaaS (Software as a
Service). The team developing the SaaS should be familiar in
database communication, API development, and network
communication. As the customers place an order, the payment is
processed and inventory is pulled from the warehouse. Once
completed, the order is fed to the shipping service, which will
then take on the role of managing the shipment. The service
provides API endpoints related to orders and shipping. The API
can be used by as many applications as necessary. Usage
examples might include employees updating the status of the
order at key points along the way (such as when inventory is
packaged, when the order is placed for carrier pickup, and
entering tracking), calculating shipping costs, or
creating/printing mailing labels. It will also track inventory
numbers and aid in the processing and management of the
shipments themselves. Employees must have access to make
updates as the order progresses. For example, warehouse
employees will be able to update when an order has been
picked, packed, and when it is shipped.
3. Here, the Shipping SaaS manages incoming order tracking
surrounded by four external systems, each requiring API access
and integration. That said, this picture will be expanded and
explained in greater detail later in the document. However,
there are some issues which need to be addressed.
The design of this application needs to be carefully created.
Since it is being designed with an API that can have a number
of different GUIs created to interact, the API needs to be
efficient, secure, well documented, and reliable. Below is a list
of major issues to consider in the development of the service
(Kodumal, 2015.)
Issues
Description
SaaS API Support from each system
Warehouse System, Customer Service System, Website Order
System.
SaaS Performance
Depending on the size and number of orders, there may be a
minimum level of performance required. Where performance is
the orders completed to time ratio.
Hardware Requirements
Given the system will need to keep track of many orders over
days to weeks, the storage requirements should be discussed.
For example, it may be cheaper and more reliable to use
Amazon Web Services, versus in-house hardware.
C.I.A. Considerations
To what degree will confidentiality be upheld? Considerations
for metrics which provide accountability regarding integrity and
availability should be discussed as well. For example, what are
the expected maintenance cycles for the service?
External System Failure
In the event of an external system failure, the system must be
able to handle such errors with elegance. That being, no data
loss unless the data needed to complete an order remains
incomplete.
Estimation and Scheduling
4. Developers sometime run into problems when having to
estimate and schedule how long it will take to develop the
software. It’s good to know what you’re getting into so that you
can better estimate the time (Writer, 2010).
Scope Creep
The project requirements and/or complexity grow and can start
to get out of control. Finally, human factors can put the project
at risk (Viswanathan, 2015).
Employee Turnover
Just like the group project it will have many different people. If
one of us have vital information for the project and leave the
group that’s project information that may never get added to the
project. The can really delay and cause a project to fail. It is
good to have sessions where the team can collaborate and share
knowledge (Writer, 2010).
Breakdown of Specification
When coding and integration begins sometime the requirements
might not be clear. This also can happen with the specification.
There can be conflict or it can be incomplete (Writer, 2010).
Productivity
There are times when projects will have long timeline. In this
case some developers tend to be a little laid back. The problem
with this is that it’s easy to lose significant time. It’s good to
set a schedule that is realistic and keep that schedule (Writer,
2010).
Logistics
The development team is not a centralized team so logistics are
a major concern. Logistics directly impact the communication
and collaboration of the team, if not properly addressed.
Gold Plating
It’s a known fact that the developers that are really good like to
show how good they really are. They sometimes add features
that are totally unnecessary. For example a developer will add
Flash to a simple login module just to make it look flashy. This
is a waste of time and programming hours (Writer, 2010).
Procedural Risks
5. Sometime day to day on the job and operation activities can go
lacking due to lack of understanding of responsibilities, the
priorities are conflicting, or improper process implementation
(Writer, 2010).
Technical Risks
There are times that firms try to diminish the functionality of
software. They do this because overruns that are connected to
high budgets and scheduling and they need to compensate for
this. There is always a battle when it comes to peak
performance and maximum functionality (Writer, 2010).
Unavoidable Risks
Unavoidable risks can include but not limited to obsolescence
of software, changes that happen in government policy, and
many other things that cannot be estimated. As the years have
gone by the software development has become a bit more
complex causing the risk to do the same. It is good to have a
plan to mitigate risks (Writer, 2010).
Development Methodology
*Portions of this section have been repurposed from SWE481-
1704B-01 Unit 1 Group Project Proposal
For this project, the scrum methodology has been selected. As
an agile methodology, scrum is iterative process that breaks
down the development into smaller chunks called sprints. Each
sprint lasts for a set period of time and consists of planning,
development, review, and retrospective. During the planning
stage top items from the backlog are selected. At the end of
each sprint a review is conducted to offer an informal look as to
what has been added or changed during the sprint. The
retrospective step allows for the team to look back at the sprint
and determine what is working and not working as far as the
development model is concerned (Sims, n.d.).
The Agile Method was birthed from real life project
experiences. There were professionals that were limited and
challenged from traditional methods such as Waterfall. The
approach that Agile takes is in response to all of the problems
6. that were being created in waterfall in the areas of philosophy
and specific processes. Agile is known for having a lightweight
framework that helps teams, giving a constantly developing
technical and functional landscape, and keeping focus on the
business value. One of the benefits of Agile is companies are
able to reduce the risk that is associated with software
development (Version One, n.d.).
Inside Agile there is a method call Scrum. The Scrum
methodology you have the ability to work in what we like to
call sprints. In this agile methodology sprints are set in blocks
of time. The sprints can range from two weeks up until a month.
At the start of a sprint there is a meeting that will take place. In
this meeting the team figures out all of the items they can
commit to and then create a log that states all of the tasks they
will perform during that sprint. In these meetings the Scrum
Master and the product owner are present (Mountain Goat
Software, n.d.).
In an Agile Scrum methodology, each developer is responsible
for completing a feature from initiation to implementation. A
scrum master (SM) is not the leader, rather is a coach, helping
each team member use Agile principles in order to best
complete their feature of work. The SM may also help define
the sprints to be implemented. The Agile methodology allows
for rapid independent development in order to combine features
into a full-fledged system.
Here is a figure taken from (Pressman, 2015) detailing the
scrum process:
Scrum is a lightweight subset of the Agile methodology. Our
current team is just 5 members, which is fitting for a
lightweight methodology. The team is also relatively
independent, also fitting for Agile. Our course is broken down
into 5 sections (sprints) with each member providing their own
unit of work (feature) and is done in a relatively rapid manner
(1 week per sprint). Due to these frequent deliverables, scrum’s
focus on teamwork, and this teams small size scrum is a
7. development methodology that is well fit for this project.
Requirements
Having a good set of requirements is essential to the success of
a project. Even the most talented development teams a project
will suffer with a bad or incomplete set of requirements. A
good set of requirements leads to fewer defects, less reworking
issues, and a product that is well fit to the needs of the end
users. To determine if a requirement is good it should be
something that customers think is needed, developers think is
achievable, testers think is testable, and stakeholders think will
fulfill the needs of the business (Perrigon, 2016.)
To gather requirements all stakeholders and a representative set
of users will be consulted to know their expectations for the
project. This will take clear communication and cooperation
between everyone involved. All stakeholders will be involved
through the entire requirement elicitation process and also the
remainder of the project. Initially all of the project’s goals and
objectives need to be established, and all requirements need to
be well documented and available to all stakeholders throughout
the project. When determining the requirements all
stakeholders will give their input based off their knowledge and
needs for the project. These requirements will be documented
and confirmed by everyone before the project progresses past
requirement elicitation. Since this project will be utilizing the
scrum methodology, requirements can be added or changed
without too much difficulty, a good set of requirements will set
the project up for success.
Ambler has provided the following basic diagram which models
the engagement between the developer and the stakeholder. This
diagram shows the responsibility of each party for determining
the requirements. The developer and the stakeholder both
collaborate together to solicit the main idea, discuss the idea as
a requirement, and model the potential requirement. The
developer is responsible for estimating the work, but the
stakeholder is responsible for determining the priority of the
requirement as the statement of their need (Ambler, n.d.).
8. For the Shipping SaaS, the following matrix begins to define the
main ideas for the requirements of the system in order to begin
design. The matrix will also show the analysis of each
requirement, its priority within the stack, and the state
(functional vs non-functional).
Requirement
F/NF
Description
rational
Measurement
Priority
Shippers
NF
Company that ships package
Need shippers in order to ship
High
Carries
NF
Company that delivers the package
Need carries in order to deliver
High
Calculate Price
F
Calculate price to ship package
So customers will get charged the correct price
Based on how its coded and the info received
High
SQL Database
F
Log information
To keep track of shipments
If information is logged or not
High
Fields for customer information
9. F
User can add information to these fields
So users can enter the correct information in the app
If the fields show up on the UI
High
PC and Phone Compatible
NF
Work all PC and cell Phones
So the user will have more choices
If the app work on all devices
Med
Add shippers and Carriers
F
Add new shippers and Carriers
New business are always arising so this function will help us
keep up with all of the new companies
If shippers and carriers can be added or not
Med
Log In
NF
Log into app
Extra Security
If users can sign in or not
High
Quick Response Time
NF
System to respond in less than 5 sec
So the user will continue to use the app
How fast the system is.
High
Firewall
10. NF
Layer of Protection
To make sure all of customer information is safe.
High
Design
This application is user the SaaS Architecture. When using the
SaaS Architecture there will be a single configuration that is
used for all carriers. This application can be installed on many
devices to support scalability. For testing purposes there will be
a second version installed to give a select few customers access
to the prerelease versions of the application. One benefit of
SaaS Architecture is you don’t have to deploy a large
infrastructure at a customer location. This will help with
eliminating the upfront commitment of resources (Hacker Noon,
n.d.).
Print Labels
Printer
DB
Order Details
Carrier
Ordering
Customer
The following class diagram depicts the class hierarchy and
begins to show the details and complexity for the required
components that are needed in order to fulfill the requirements.
On the surface, the service interacts with orders. However, the
service has to keep track of users; either individual users or
systems as users, both internal and external. At times the
customer may need to be contacted so that information needs to
be stored. The main goal of the service is to ship orders,
resulting in the need for payment and shipping information.
Since shipping requires a mailing label, the service must also be
11. able to store that information.
The following is a use case that shows how a warehouse
employee will be able to process an order from start to finish
and set the status in the system.
Additional textual use case examples are as follows:
1.1 Use Case Customer and Ordering
Actors
Customer
System
Purpose
The customer logins in their account and orders something.
Overview
Something needs to be ordered in order for our app to be used
Typical course of events
1. The customer logs in.
2. Order something.
3. Send the information to carrier.
System Response
Will notify the customer that their order is being processed.
1.2 Use Case Carrier
Actors
Carrier
System
Purpose
The carrier logins in their account to finish order.
Overview
The carrier inputs the order in to send it through the system.
Typical course of events
1. The carrier logs in.
2. Finish the order by putting information in and making sure
it’s correct.
3. Send the order details so it can be logged in the database.
System Response
Will notify the carrier that their order is being processed.
12. 1.3 Use Case Database
Actors
Database
Purpose
Log orders.
Overview
The DB captures every order that has been requested.
Typical course of events
1. Details are sent form the carrier to the DB.
2. The DB logs the information.
3. It show if information is correct or not. (ShipRequest,
ShipResponse)
4. Information is sent so it can continue through the process
System Response
Will log all information dealing with shipments.
1.4 Use Case Printer
Actors
Printer
Purpose
Print Labels.
Overview
The printer gets a request and prints labels.
Typical course of events
1. A request will come to the printer
2. Print out labels for boxes.
System Response
Print Successful.
The data that will be required will be what is on the UI above.
For Example, the UI will ask for product name: Beats By Dre,
Warehouse: East, Carrier: UPS, Carrier Service: Overnight,
Package Size: 1x1, Customer Id: 2654, Customer Name: James
Buford, and Address: 123 Capehart.
13. Since the application is a cloud service, it does not have an
interface of its own. However, an example interface of a
consuming application is below.
Main Screen
123 Capehart
James Buford
2654
1 x 1
Overnight
UPS
East
Beat By Dre
Product Name
Warehouse
Carrier
Service
Package Size
Customer Id
Customer Name
Address
Development and TestingDevelopment
Development of the shipping SaaS system is handled using a
Scrum subset of the Agile methodology. The key behind using
the methodology is that the process is lightweight and follows
quick iterations of code delivery, called sprints. These sprints
represent a window of time in which functionality will be coded
and delivered from start to finish. A graphical representation of
the process is below. Using Scrum, the development team will
be able to increase the quality of the deliverables, better handle
(and expect) changes to scope, provide quicker, better
estimates, and hold more control over the project schedule and
state (cprime, n.d.).
14. There are three key processes that will be used to drive the
development process. These processes will be detailed
below.Prototype
One of the processes that we will use is prototyping. The
prototyping process includes four steps.
1 Identify Requirements: In this step of the phase the software
publishers will figure out what the software will be able to do.
Then the users are selected and they will give there insight on
what they want from the software. Then the project is sent off to
the team that is going to develop it (Stanley, n.d.).
2 Develop Prototype: In this step the team will look over all of
the requirements that were given and then put a model together
of what a finished product will look like. The initial prototype
really can be simple. For example the prototype can be drawn
on a whiteboard or may a piece of paper. It doesn’t have to be
limited to that but it can be as simple as that (Stanley, n.d.).
3 Review: After the prototype has been developed the publisher
will have a chance to see what it looks like and how the team
envisioned what was given to them. If the prototype is more
advanced then the end user will have a chance to actually use
the product and then give some suggestions on what they feel
should be change or improved. This is called beta testing
(Stanley, n.d.).
4 Revise: This is the last step of the process. This step requires
the team to go back and make the necessary updates and
revisions to the prototype based on the feedback that they
received (Stanley, n.d.).Integration Testing
Another process that can be used is the integration Testing
process. There are four steps to this process.
1 Identify Unit Interfaces: The team or developer will identify
and document the unity interfaces. The following are examples
of unit operation:
· Responding to queries for information (Software Testing
Stuff, n.d.).
· Managing all data that is entered (Software Testing Stuff,
15. n.d.).
· Updating, creating, and managing all data that’s entered
(Software Testing Stuff, n.d.).
· Receiving and passing information from other units (Software
Testing Stuff, n.d.).
· Sending messages to different terminals (Software Testing
Stuff, n.d.).
· Providing results (Software Testing Stuff, n.d.).
2 Reconcile Interfaces for Completeness: All of the information
that is needed for integration test template comes from all
program units that are being tested. The reconciling of
interfaces happens when one unit interfaces with another. For
example if Unit A sends data to Unit B, Unit B should tell Unit
A that it received the data (Software Testing Stuff, n.d.).
3 Create Integration Test Conditions: Usually there are a few
test conditions that are already prepared for each unit. When the
condition is created, that condition is then put in the test
template (Software Testing Stuff, n.d.).
4 Evaluate the Completeness of Integration Test Conditions:
There are a few questions that can help with the evaluation of
the completeness of integration test conditions. They are:
1. Is there an integration test developed (Software Testing
Stuff, n.d.)?
2. Are all of the modules interfaces validated so that they can be
recorded (Software Testing Stuff, n.d.)?
3. Are the software units involved into the testing (Software
Testing Stuff, n.d.)?
4. Are the business transactions being tested (Software Testing
Stuff, n.d.)?
5. Are the terminal functions being tested (Software Testing
Stuff, n.d.)?IDE
IDE stands for Integrated Development environment. For this
project the team will be using NetBeans. The NetBeans
environment will allow us to produce the code for the project.
NetBeans has a great compiler and is one of the best when it
comes to programming in the Java Language.
16. Testing
Testing of software needs to be performed early and often. One
of the benefits to the scrum methodology is the early and
frequent deliverables that are created during each sprint. This
project will utilize unit testing, integration testing, system
testing, and user testing. These aspects will combine to ensure
that a quality product is being delivered.
Unit testing focuses on ensuring that each small piece of code is
working. This is not a test to ensure that requirements are being
successfully met, simply that each individual piece of code does
exactly what it is supposed to do. One of the goals of unit
testing is to find errors or defects in code before it is integrated
with other parts of the program. The tests that are created for
these unit tests are to be documented well so that they will be
repeatable. As much of the testing process will be scripted and
automated to ensure that testing can be done efficiently and
frequently. Utilizing JUnit will aid in the automation of these
tests allowing for testers to write code for the tests.
Integration testing takes the different units and tests that they
properly interact and function together. Even though each unit
may have been fully tested, they may not properly interact with
the other units. This testing is designed to help find issues
integrating these units together into one larger grouping of units
and eventually full program.
The next type of testing that will be utilized is system testing.
This type of testing will test the integrated system. One of the
focuses of this testing is to ensure that the software meets the
requirements. This will be done by comparing the requirements
with what is being delivered in a measurable way. Tests will be
created that test each function and if the proper result is
achieved, the test is considered successful.
Additional details are as follows:Unit Testing
The unit testing of software is mostly done during the coding of
the application. The main goal of unit testing is to take parts of
the code and make sure that they work correctly. For example if
the team wanted to see if the login piece of the code is working
17. correctly they would test only that part of the code. They will
test for things such as what happens if the wrong username or
password is entered. They can also test for the correct username
and password (Guru 99, n.d.).
There are plenty of times that developers try to get by only
doing minimal unit testing. Doing this will cause a high defect
rate which can lead to costly fixes during the system,
integration and beta testing. It’s safe to that doing proper unit
testing can save time and money (Guru 99, n.d.).System Testing
System testing is when the team is able to test a fully integrated
product. Normally software is an element of a bigger system.
Ultimately, software is interfaced with many different systems.
System testing is based on a series of test. These tests are
supposed to exercise the entire system. For example with our
shipping app the team world run test to see if the full process
work completely with no errors. The also will throw some
monkey wrenches in to make sure it fails when it supposed to
fail (Guru 99, n.d.).User Testing
Usability testing is when an actual user tests the end product.
For example one of the customers and shippers who will be
working with the product uses it to see how it works. In return
the development team is able to see if the user likes it or not.
The will also give the development team a chance to fix
anything that the customers don’t like about the system within
reason. This can sometime be called Beta testing
Below are some example test cases:Test Case 1
Test Suite ID
TS001
Test Case ID
TC001
Test Case Summary
To verify that user has access
18. Related Requirement
RS001
Prerequisites
1. User Name
2. Password
Test Procedure
1. Enter Username
2. Enter Password
3. Click Login
Test Data
1. User Name: Luke189_Fold
2. Password: YouCantStopMe
Expected Result
1. The system should give the user access to the application if
all of the credentials checks out
Actual Result
1. Access Granted
Status
Success
Remarks
This is a sample test case.
Created By
John Lane
Date of Creation
12/14/2017
Executed By
Jane Roe
Date of Execution
02/20/2017
Test Environment
· NetBeansTest Case 2
Test Suite ID
TS002
Test Case ID
TC002
Test Case Summary
19. To verify that a shipment can be shipped
Related Requirement
RS002
Prerequisites
1. User Name
2. Password
3. Shipper
4. Carrier
5. Dimensions
Test Procedure
1. Enter Username
2. Enter Password
3. Click Login
4. Enter Product Name
5. Enter Warehouse
6. Enter Carrier
7. Enter Service
8. Enter Package Size
9. Enter Customer Id
10. Enter Customer Name
11. Enter Address
12. Click Ship
Test Data
3. User Name: Luke189_Fold
4. Password: YouCantStopMe
5. Product Name: Beats By Dre
6. Enter Warehouse: East
7. Enter Carrier: UPS
8. Enter Service: Overnight
9. Enter Package Size: 1x1
10. Enter Customer Id: 2654
11. Enter Customer Name: James Buford
12. Enter Address: 123 Capehart Dr.
Expected Result
The system should send a request to and receive a response if
everything checks out.
20. Actual Result
Response Received
Status
Success
Remarks
This is a sample test case.
Created By
John Lane
Date of Creation
12/14/2017
Executed By
Jane Roe
Date of Execution
02/20/2017
Test Environment
· NetBeansTest Case 3
Test Suite ID
TS003
Test Case ID
TC003
Test Case Summary
To verify that shipping information is logged in Database
Related Requirement
RS003
Prerequisites
1. User Name
2. Password
3. Shipper
4. Carrier
5. Dimensions
Test Procedure
1. Enter Username
2. Enter Password
3. Click Login
4. Enter Product Name
5. Enter Warehouse
21. 6. Enter Carrier
7. Enter Service
8. Enter Package Size
9. Enter Customer Id
10. Enter Customer Name
11. Enter Address
12. Click Ship
13. Login to SQL server
14. Check Database
Test Data
1. Product Name: Beats By Dre
2. Enter Warehouse: East
3. Enter Carrier: UPS
4. Enter Service: Overnight
5. Enter Package Size: 1x1
6. Enter Customer Id: 2654
7. Enter Customer Name: James Buford
8. Enter Address: 123 Capehart Dr.
Expected Result
The record with the information provided should be in the
Database
Actual Result
Record Received
Status
Success
Remarks
This is a sample test case.
Created By
Terry Buford
Date of Creation
1/14/2017
Executed By
Justin Rhodes
Date of Execution
1/20/2017
Test Environment
22. · NetBeans
· SQL Server
Project Schedule
The core scheduling concept in an Agile Scrum methodology is
iteration-based. Units of work are prioritized and grouped
together into small subsets and added to a time box known as a
sprint. The duration of the sprints are pre-determined and set by
the project team, the scrum master, and/or the product owner. In
this perspective, scheduling of the project is relatively simple
and rigid. The product owner, knowing the duration of each
sprint, prioritizes work items that the project team will add to
the sprint. The project team works as many items as possible for
the duration of the sprint. Work items that are not completed by
the end get moved back to the backlog and the process is
repeated for each additional sprint. Multiple sprints can be in-
flight at the same time, but does not change the schedule. The
end result is a constant project schedule that is determined in
the early stages of life of the project and is strictly followed
throughout the course of the project (Project Scheduling, n.d.).
In order to reach the optimal state of the process, there are
milestones that must be met. With Agile being a quick
methodology, these milestones are granular at the unit of work
level so as not to hold up other units of work if they are not
met. The key milestones are as follows:
Requirements – The product owner must identify their statement
of need. It must be able to be broken down to a unit of work
that can fit within the defined sprint window. It must be
justifiable. The requirement is turned in to a user story, which
is a unit of work, and added to the project backlog. It will then
be officially tracked using the workflow board of choice (such
as Target Process). Of all steps within the Agile Scrum process,
this milestone does not have a strict time box assigned to it. The
product owner is not held to any time standard for completing
requirements. However, the product owner should be aware that
the unit of work will not be eligible to be pulled from the
23. backlog until it is completed.
Grooming – The product owner and project team must be on the
same level of understanding of the requirements for the work.
The unit of work must be able to be completed within the
designated time box of the sprint. The goal of grooming is to
iron out any gray or questionable areas of the requirements. The
product owner will assign a priority of the task. The project
team will give a basic idea of complexity and/or time required.
Grooming sessions should occur weekly and be time boxed so as
to not require excessive time (such as 1 hour sessions). Any unit
of work that does not complete the grooming process
successfully remains in the product backlog until the next
session. Completed items of work are then eligible to be added
to the next sprint.
Iteration development – Successfully groomed items are added
to the sprint iteration. The development team designs, develops,
and completes the unit of work in the time box of the sprint. If a
unit of work cannot be completed in the allotted time box of the
sprint, it must return to the product backlog. Completed items
are pushed forward for testing.
Testing – Test builds are created based on units of work that
have successfully completed all of the above milestones.
Testing of each unit of work is not statically set to a fixed
duration, but the product owner and quality assurance team must
know that the unit of work cannot be deployed to production
until completed. Units of work that to do not pass testing must
return to the product backlog for correction.
While the timeline of the project as a whole is not constrained
by duration, each sprint required to complete the project is
bound to a set of pre-defined time boxes. The scrum master will
ensure that the timeline is strictly followed. Float is only
allowable in the requirements and testing phase, as these two
phases cannot be measured and constrained. However, in order
to meet the set duration of the sprint, there is a soft-deadline for
both processes (as seen in the following timeline). A work
board (such as Target Process) will be used to track units of
24. work throughout the process. The following timeline will be
followed for the Shipping SaaS project. As a reminder, the
timeline is not based on the project as a whole, rather at the
granular sprint level. The timeline may be repeated as many
times as necessary in order to complete all items in the product
backlog. The timeline must have at least one sprint and
additional optional sprints may be added as well (McGevna,
2012).
The project will flow a few different paths during developments
with the longest path taking only 1 day longer than the shortest
path. This does not leave much room for error in any path and
very little time to recover if any of the shorter paths happen to
get off schedule. Each path will need to stay on schedule as
much as possible.
Timeline and Gantt
Network Diagram
Float and Slack
Activity
Predecessor
Duration Days
A
-
5
B
A
3
27. 5
10
FF = 0
FF = 0
FF = 0
TF = 0
TF = 0
Risk Analysis
Like any project, this one comes with certain risks. These risks
range in their likelihood and severity. Within this process, as
said by (Pressman, 2015), “There are two distinct types of risks
for each of the categories that have been presented in Section
35.2.” These risks are Generic risks, which are risks to every
software project and Product-Specific risks, or risks which only
affect the system being built. Pressman continues to outline
many metrics associated with identifying generic risks which
this project will use. These metrics are: product size, business
impact, stakeholder characteristics, process definitions,
development environment, Technology to be built, staff size,
and experience. In the following, the analysis will be
identifying how these metrics apply to the project, as well as
their associated risks.
Overall Product Size (PS) in the software sense refers to its
scope as well as resources it will need to consume to be
completed. Given this project requires a good deal of checks
and balances regarding the security of transporting order
information over a network, it is fair to say the size of this
project large, but not huge. That is, it will take a significant
amount of resources to effectively develop a scalable ordering
API. The risks involved in a project which takes resources
depends on the resources to be used themselves, and the risks
will be identified in the components of those resources.
The business impact (BI) of this project is hard to quantify.
That said the greatest impact will most likely be scalability.
However, this brings with it many risks. One of which is how
28. the system deals with a single system failure. For example, in
the case of a warehouse system failure the database won’t be
able to update the warehouse, but if handled correctly, the
ordering system should still post to the database, and when
available, the warehouse can receive the order updates.
Stakeholder characteristics (SC) in this project involves
knowledgeable individuals given that they maintain the current
systems in place. For example, the database system most likely
already contains many protocols that can be modified by the
database administrator to fit the new system. Likewise, the
website ordering system probably contains a back end which
interfaces with the existing database, made by an interface
technician. These stakeholders will need to provide information
for the new system. The risk associated with this is that they
may be resistant to change, or not as knowledgeable as expected
on the in-place systems, in which case additional time will need
to be allocated or alternative solutions in the sprint should be
identified.
Process Definition (PD) The software process has been defined
to a degree acceptable to the agile methodology. That is, while
in other methodologies more information regarding the build
definitions, current requirements, life cycle details, and project
deliverables should be defined, in agile, much of this is left up
to the experts developing and their current sprint. With that
being the case, software developing experts tend to enjoy
adding in features which don’t necessarily “need” to be
implemented, but make the system perform marginally better, or
easier to use. This is called feature creep and should be
monitored. An interface engineer may “pool” the number of
connected systems for example, while this may be useful in the
case of using hundreds of systems, this system does not contain
that kind of topology; pooling introduces needless complexity.
Development environment (DE) is unknown, however given the
business impact, it is best the developers work in the buddy
system. That is, two developers work together to solve issues
and analyze code as it is being produced.
29. The Technology to be built (TB) includes an API giving four
systems the capability to communicate & work together in a
distributed secure network. This introduces a large amount of
complexity, as systems will need to transfer data over a wide
area network. Risks involve things like data leaks or missing
encryption, and service interruptions or complications if a
network node goes down. As such, any network interruptions or
system failures will need to have a disaster recovery plan.
The Staff size and experience (SE) of this project is yet to be
known, but given the size, requires at least one Senior C#
Network Engineer, two C# Technical Interface Developers, one
Senior Software Engineer, and one Database Administrator able
to produce protocols for accessing the database. Outsourcing
black box tests is an effective solution to this situation as well.
Ensuring staff contains the required experience and knowledge
is a major risk to the project, though very unlikely.
Schedule slippage is a common problem with many projects of
scale. Any unexpected delays, including things as simple as
illness or unexpected absence of a team member, can throw off
the entire schedule. As an effort to mitigate this risk, an extra
“slippage” day has been strategically added to several phases of
the project. By not adding a block at the end of the project we
also reduce the likelihood of procrastination as employees
subconsciously add this block to their perceived sense of
urgency.
To help avoid or plan to mitigate these risks, some of the risks
have been identified through a brainstorming technique.
Brainstorming allows for people to give their ideas towards
possible risks, the more ideas given leads to more risks being
identified. Brainstorming is a good tool to use when dealing
with formative project planning. Brainstorming can also be used
to take advantage in finding risks and risk scenarios for
projects. Although brainstorming is very simple, it can be really
effective in a group setting. The good thing about brainstorming
it can be done in a way that people won’t have to be criticized
by other or feel inhibited. The way the team will do this is each
30. member will try to build on the ideas that are given by
preceding comments. There will be absolutely no criticism or
disapproving allowed. The main reason for brainstorming is to
encourage as many ideas that if done correctly it can cause
other ideas to be triggered (Ritter, 2008).
The following table lists the major risks identified for the
Shipping SaaS. The table includes specific functionality risks
(red), general project risks (blue), and architectural risks
(green).
Risk Name
Risk Description
Risk Likelihood
Risk Impact
Risk Impact Description
Risk Response
Risk Response Description
Login Issues
User may not be able to access account
High
High
May lose customers
Control
Make sure that there support team can fix this problem
Package gets lost
When package is shipped it doesn’t get to its destination
High
High
Customer may not get package on time
Avoid
All packages will have tracking number to show exactly where
the package is located.
Fee
Shipper gets charged the wrong fee
Medium
Medium
The shipper may get charged more than actual
31. Transfer
This should be taken care of by the carrier
Labels
Labels don’t print
High
High
Without the labels the packages cannot be shipped
Control
Make sure all printers are set up correctly.
Lost Information
Orders can be deleted
Low
Medium
May not be able to go back and check orders.
Avoid
Make sure that when data is logged it’s also saved into a backup
folder.
Scope Creep
Work does not follow what was initially specified
High
High
Set the project behind schedule and/or over budget.
Avoid
Changes will need approval from project management and the
customer. Customer will be made aware of the potential
changes to schedule and budget if the requirement is changed.
Human Factor
Development team fluctuations and schedules
High
High
Push the project off schedule
Control
Project management will need to asses in a case by case manner
if people can be moved around to cover the position, or if new
people are needed.
Experience
32. Development team work experience
Medium
Medium
Set the project off schedule and possible quality from lack of
experience.
Control
Project management will carefully select the team and continue
to monitor making changes as needed.
Security
Inadvertent exposure or deliberate unauthorized access
Low
High
Without proper security in place, customer and/or payment
information may end up “in the wrong hands”.
Avoid
Use security roles and access restrictions with redundancy.
Reliability
Service uptime and accuracy
Medium
High
If the service is unavailable, the customer will experience
delays that may be detrimental to their own bottom line. If the
service provides incorrect results, even just once, the customer
will have little faith in the service.
Control
Hardware redundancy will allow the service to fail-over to other
hardware devices in the event of a system outage.
Performance
Service response and timing
Medium
Medium
If the service they use is slow or cannot complete the work
within the same session then it may not be beneficial for them
to make use of that service.
Control
Full testing, from unit to system/integration. Proper building of
33. the hardware environment also ensures that the balanced amount
of server power is available for the requests to be able to
complete quickly
References
Ambler, S. W. (n.d.). Retrieved December 01, 2017, from
http://www.agilemodeling.com/essays/agileRequirementsBestPr
actices.htm
Guru99.com. (n.d.). How to Write Test Cases: Sample Template
with Examples. Retrieved December 06, 2017, from
https://www.guru99.com/test-case.html
Hacker Noon. (n.d.). SAAS(Softare as a Service) Platform
Architecture. Retrieved from https://hackernoon.com/saas-
software-as-a-service-platform-architecture-757a432270f5
Kodumal, J. (2015, September 30). What we talk about when we
talk about API reliability. Retrieved November 22, 2017, from
http://blog.launchdarkly.com/what-we-talk-about-when-we-talk-
about-api-reliability-2/
McGevna, V. (2012, May 2). Creating an Agile Schedule with
MS Project. Retrieved December 12, 2017, from
https://www.mpug.com/articles/creating-an-agile-schedule-with-
ms-project/
Mountain Goat Software. (n.d.). Scrum. Retrieved from
http://www.mountaingoatsoftware.com/agile/scrum
Perrigon, M. (2016, August 24). Benefits of the requirements
gathering process. Retrieved November 24, 2017, from
https://cybercorpsoftware.com/blog/what-are-the-benefits-of-a-
high-quality-requirements-gathering-process/
Pressman, S. R. (2015). Software Engineering: A Practitioner's
Approach, (8th ed.). New York: McGraw-Hill Education.
Project Scheduling Best Practices in an Agile Environment.
(n.d.). Retrieved December 12, 2017, from
http://innovategov.org/2016/02/05/project-scheduling-best-
practices-in-an-agile-environment/
Ritter, D. (2008, September 17). Risk Analysis Techniques.
Retrieved December 19, 2017, from
https://certifedpmp.wordpress.com/2008/09/17/risk-analysis-
34. techniques/
Sims, C., & Johnson, H. L. (n.d.). Scrum: A Breathtakingly
Brief and Agile Introduction. Retrieved November 22, 2017,
from http://www.agilelearninglabs.com/resources/scrum-
introduction/
Version One. (n.d.). The Benefits of Agile Software
Development. Retrieved from
https://www.versionone.com/agile-101/agile-software-
development-benefits/
Viswanathan, B (2015, November 19) Understanding the 4
Types of Risks Involved in Project Management. Retrieved
November 22, 2017, from https://project-
management.com/understanding-the-4-types-of-risks-involved-
in-project-management/
What is Agile? What is Scrum? (n.d.). Retrieved December 06,
2017, from https://www.cprime.com/resources/what-is-agile-
what-is-scrum/
Writer, S. (2010). Top 10 Software Development Risk.
Retrieved from https://www.itproportal.com/2010/06/14/top-
ten-software-development-risks/